x
y
z
Static task
static1
Behavioral task
behavioral1
Sample
38e40bb94a56e0a3665439594c850b4c_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
38e40bb94a56e0a3665439594c850b4c_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
38e40bb94a56e0a3665439594c850b4c_JaffaCakes118
Size
22KB
MD5
38e40bb94a56e0a3665439594c850b4c
SHA1
09688815519783989d3d1b8635d600acd0a85a33
SHA256
003471c83f9978d960a75ae256367b7a79008c71e2573460567fcd9b8dbc2f3c
SHA512
f1e3ad5602c45f12283b2e13e0357020fe577ac9f4946c9143ff2a9c590c5d11d2ba96736029bfc2ccd17ab28ff3d153706c67c2f0f03997f7660f8a78184e6f
SSDEEP
384:YtXMGdvGenowXoEWxFvlzVeyNKvuwy2z4UEM+xCJMA6W1D:YthdvpxXoNxFvlzoyKEMgCJM
Checks for missing Authenticode signature.
resource |
---|
38e40bb94a56e0a3665439594c850b4c_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetTempPathA
GetProcAddress
GetModuleHandleA
MulDiv
GetTickCount
CloseHandle
WriteFile
ReadFile
CreateFileA
WaitForMultipleObjects
WaitForSingleObject
DeleteFileA
CreateEventA
lstrcmpA
GetTempFileNameA
lstrcatA
GetModuleFileNameA
InterlockedExchange
RtlUnwind
HeapReAlloc
HeapFree
GetProcessHeap
HeapAlloc
SetFileAttributesW
WinExec
GetFileAttributesA
lstrlenA
CreateProcessA
VirtualQuery
GetLastError
GlobalAlloc
lstrcpynA
lstrcpyA
SetFilePointer
GlobalFree
wsprintfA
CallWindowProcA
DestroyWindow
EnableWindow
GetWindowLongA
CreateWindowExA
SetWindowLongA
SetDlgItemTextA
MessageBoxA
SetWindowTextA
SendMessageA
GetDlgItem
GetFocus
IsWindowVisible
RegisterWindowMessageA
CharLowerBuffA
ShowWindow
GetClientRect
GetWindowRect
RegOpenKeyA
RegQueryValueExA
RegCloseKey
RegEnumValueA
RegOpenKeyExA
InternetSetFilePointer
InternetConnectA
HttpOpenRequestA
InternetCrackUrlA
FindCloseUrlCache
FindFirstUrlCacheEntryA
InternetReadFile
InternetCloseHandle
InternetOpenA
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
x
y
z
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ