DownLink
Install
UpLink
Static task
static1
Behavioral task
behavioral1
Sample
38b68790bb25bb424b805ffed610ee9c_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
38b68790bb25bb424b805ffed610ee9c_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
38b68790bb25bb424b805ffed610ee9c_JaffaCakes118
Size
155KB
MD5
38b68790bb25bb424b805ffed610ee9c
SHA1
bed4b19f11c8b46d3098cf63b5159eac7b3ce428
SHA256
c8e613ecd7b4783ea535f669d173a0306ba35b20de0f93e65015995feba43b6b
SHA512
f86d549f12580641c8888cc05f1355ce6b305299864cc865dbd066b4649299ca9cb396471a2027e1a2bc9e9725adc8fdb2882b02e8536f88c67e9eaba892b838
SSDEEP
3072:QG2nb11GVTOeP5xh+ppanECyJRPjE/AYNHjE+ceo7Tho6nXZ:QTn/GVbP5xcppnPQndjEl9ThTp
Checks for missing Authenticode signature.
resource |
---|
38b68790bb25bb424b805ffed610ee9c_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
VirtualQuery
WriteProcessMemory
GetCurrentProcess
VirtualProtect
lstrcmpiA
GetModuleFileNameA
LoadLibraryA
LoadLibraryW
LoadLibraryExA
LoadLibraryExW
WriteFile
CreateFileA
ReadFile
GetFileSize
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
Sleep
OpenFileMappingA
SetLastError
GetLastError
CreateThread
DeleteCriticalSection
TerminateThread
GetExitCodeThread
LeaveCriticalSection
EnterCriticalSection
CreateToolhelp32Snapshot
ConnectNamedPipe
CreateNamedPipeA
InitializeCriticalSection
HeapAlloc
HeapFree
HeapSize
HeapReAlloc
DeleteFileA
Process32Next
TerminateProcess
OpenProcess
Process32First
SetThreadPriority
GetCurrentThread
HeapCreate
HeapDestroy
SetEnvironmentVariableA
CompareStringW
CompareStringA
SetEndOfFile
GetOEMCP
Module32First
Module32Next
CloseHandle
GetModuleHandleA
GetProcAddress
GetCurrentProcessId
GetACP
GetSystemInfo
DisconnectNamedPipe
RtlUnwind
InterlockedDecrement
InterlockedIncrement
GetTimeZoneInformation
GetSystemTime
GetLocalTime
GetCommandLineA
GetVersion
GetEnvironmentVariableA
GetVersionExA
VirtualFree
VirtualAlloc
IsBadWritePtr
ExitProcess
MultiByteToWideChar
GetStringTypeA
GetStringTypeW
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
TlsGetValue
WideCharToMultiByte
LCMapStringA
LCMapStringW
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetUnhandledExceptionFilter
IsBadReadPtr
IsBadCodePtr
SetFilePointer
SetStdHandle
FlushFileBuffers
GetCPInfo
InterlockedExchange
CallNextHookEx
SendMessageA
PostMessageA
UnhookWindowsHookEx
SetWindowsHookExA
FindWindowA
RegCloseKey
RegCreateKeyExA
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
SHRegSetUSValueA
ImageDirectoryEntryToData
DownLink
Install
UpLink
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ