Always
CallByControl
FukFunc
GetPlayerVersion
Run
Start
Stop
playAda
Static task
static1
Behavioral task
behavioral1
Sample
377dcbf732f848a71c5eec5fb41de7d9_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
377dcbf732f848a71c5eec5fb41de7d9_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
377dcbf732f848a71c5eec5fb41de7d9_JaffaCakes118
Size
219KB
MD5
377dcbf732f848a71c5eec5fb41de7d9
SHA1
7fff8bd66b73d23244d41986304e56feb3fb85e6
SHA256
7cddd0d6d5480460b8991cb3dfb12b31df5525400a808c4a72725c310818d254
SHA512
6751ae444e6c0399ec6a17e51c381b4eae6f0c8645a367f734be115bd49557625e0792ca59050acfbac0aa85ba3ebefca99c595ba358150ec748f41b262f1707
SSDEEP
3072:fC3q3fqqx6N+RYorGvy6ZMu5A9zd3RCDN4vCFV0sc/m67CAxwe7c6k6DRWR1Z+kv:O6R0q66pBRvCFV8V7CHe4FblnYBYsKP
Checks for missing Authenticode signature.
resource |
---|
377dcbf732f848a71c5eec5fb41de7d9_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
WSACleanup
CoTaskMemFree
InternetReadFile
URLDownloadToFileA
GetForegroundWindow
DeleteObject
RegQueryValueExA
SHGetFolderPathA
SysAllocString
Always
CallByControl
FukFunc
GetPlayerVersion
Run
Start
Stop
playAda
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE