gcged
rewtwtw
Static task
static1
Behavioral task
behavioral1
Sample
3508c35133d49c22f6bd2044b0377ee9_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3508c35133d49c22f6bd2044b0377ee9_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
3508c35133d49c22f6bd2044b0377ee9_JaffaCakes118
Size
30KB
MD5
3508c35133d49c22f6bd2044b0377ee9
SHA1
ee7c2d5a304affc4286e9b346bc20f179d563695
SHA256
5f77055ced016da14eaa639ad35484c78cc331c70107aef9a9b07e246ffdee2e
SHA512
8f06770b1198afc2b38b8efe3d9cbe039a7abf69d8a095249ea8585ec68eaa90a5a91190ef3633a7281596ea13e6d4076a88921b84606cbb46cc5bbb17d29969
SSDEEP
768:TIukiDAU/0xmZDTg0z8Zdlt/p84ImRV++G:7k0MxG/gq0/DCx
Checks for missing Authenticode signature.
resource |
---|
3508c35133d49c22f6bd2044b0377ee9_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
WritePrivateProfileStringA
CreateThread
SetEvent
WriteFile
TerminateThread
IsBadReadPtr
VirtualFree
GetPrivateProfileStringA
GetCommandLineA
CreateMutexA
GetCurrentProcessId
GetTickCount
VirtualFreeEx
lstrlenA
VirtualAllocEx
GetCurrentProcess
GetModuleFileNameA
VirtualAlloc
SetUnhandledExceptionFilter
SetThreadContext
OpenThread
WideCharToMultiByte
MultiByteToWideChar
TerminateProcess
CreateProcessA
ExitProcess
GetCurrentThreadId
DisableThreadLibraryCalls
VirtualProtectEx
CreateEventA
GetLastError
WaitForSingleObject
ResetEvent
CreateFileA
ReadFile
CloseHandle
Sleep
DeleteFileA
GetTempPathA
lstrcatA
GetModuleHandleA
LoadLibraryA
ReadProcessMemory
GetProcAddress
GetWindowThreadProcessId
CallNextHookEx
GetWindowTextA
RegCreateKeyExA
RegOpenKeyExA
RegSetValueExA
RegCloseKey
??3@YAXPAX@Z
_strcmpi
_strlwr
_stricmp
sprintf
strcat
strlen
strcpy
strstr
memset
??2@YAPAXI@Z
memcpy
strrchr
rand
srand
strncpy
strchr
strcmp
__CxxFrameHandler
gcged
rewtwtw
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ