Command
Install
Main
Opt
Service
SetProc
Uninstall
Static task
static1
Behavioral task
behavioral1
Sample
38ce5a1c26faae9ec830abd1a3e20570_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
38ce5a1c26faae9ec830abd1a3e20570_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
38ce5a1c26faae9ec830abd1a3e20570_JaffaCakes118
Size
564KB
MD5
38ce5a1c26faae9ec830abd1a3e20570
SHA1
fc742f8684c80e7562fb84f56b01540fb6a55bea
SHA256
b256792d0b1b864beb4d579ad9ae00ebda3191ab8018328de53c67fd280aeab9
SHA512
beada6ac75f9aa92a10e2582183b1e4c6cd514b032bd795d6145a67f69ccb16d9eedeb781f93a8f92d693393122c6dfee364aea78da3ed9fd3ebdb5fe1384b2e
SSDEEP
12288:5aHrEXcpGjii/F4ieH59Z4o7bjonFhafIVoWWfwSGYSm+m:5EWIcxFteZPnKh8WWJ
Checks for missing Authenticode signature.
resource |
---|
38ce5a1c26faae9ec830abd1a3e20570_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
VirtualAlloc
VirtualProtect
VirtualFree
GetProcAddress
LoadLibraryA
IsBadReadPtr
HeapFree
GetProcessHeap
FreeLibrary
HeapAlloc
HeapReAlloc
RtlUnwind
GetCurrentThreadId
GetCommandLineA
GetVersionExA
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
HeapDestroy
HeapCreate
IsBadWritePtr
TlsAlloc
SetLastError
GetLastError
TlsFree
TlsSetValue
TlsGetValue
GetModuleHandleA
ExitProcess
TerminateProcess
GetCurrentProcess
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
UnhandledExceptionFilter
WriteFile
InitializeCriticalSection
InterlockedExchange
VirtualQuery
SetUnhandledExceptionFilter
IsBadCodePtr
GetACP
GetOEMCP
GetCPInfo
GetLocaleInfoA
GetStringTypeA
MultiByteToWideChar
GetStringTypeW
LCMapStringA
LCMapStringW
HeapSize
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetSystemInfo
SetWindowsHookExA
Command
Install
Main
Opt
Service
SetProc
Uninstall
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ