cfds
fdsce
Static task
static1
Behavioral task
behavioral1
Sample
358f3e5c8f6d7f8511347492c25068ec_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
358f3e5c8f6d7f8511347492c25068ec_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
358f3e5c8f6d7f8511347492c25068ec_JaffaCakes118
Size
27KB
MD5
358f3e5c8f6d7f8511347492c25068ec
SHA1
f73da035cd55995e465ddb09a704ccd9f7622dea
SHA256
932ec2e8100b93d9433888892b0bb5e00e4d8c159ecbfb580a4c179300d50fe3
SHA512
0c4416f8ae3287bc6c803ae0a501226b1e6c3aff6c89b1526bbf2fee60015d97f0f76384689d38b5e8236256bd9caa5f031e10b5916d9b74bc0c2325561d786c
SSDEEP
768:wRU6QkFymVkFRUbwRcSegDC/ATbB156B5YejVJmR:KQg8Hxz5LehJmR
Checks for missing Authenticode signature.
resource |
---|
358f3e5c8f6d7f8511347492c25068ec_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetLocalTime
CloseHandle
ReadFile
CreateFileA
GetTempPathA
VirtualAlloc
WriteFile
IsBadReadPtr
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GetModuleFileNameA
InitializeCriticalSection
VirtualProtectEx
VirtualProtect
GetPrivateProfileStringA
WideCharToMultiByte
DeleteFileA
EnterCriticalSection
ReadProcessMemory
SetUnhandledExceptionFilter
SetThreadContext
OpenThread
MultiByteToWideChar
TerminateProcess
CreateProcessA
GetCurrentThreadId
GetCurrentProcess
ExitProcess
GetCommandLineA
Sleep
VirtualAllocEx
TerminateThread
CreateThread
GetCurrentProcessId
CreateMutexA
GetLastError
GetModuleHandleA
LoadLibraryA
LeaveCriticalSection
GetProcAddress
GetWindowTextA
CallNextHookEx
GetAsyncKeyState
ToAscii
GetWindowThreadProcessId
_strupr
_strcmpi
_stricmp
_strlwr
strcat
sprintf
strcpy
strlen
strncpy
strstr
memset
memcpy
strcmp
??2@YAPAXI@Z
wcslen
strrchr
??3@YAXPAX@Z
strchr
__CxxFrameHandler
cfds
fdsce
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ