cfds
fdsce
Static task
static1
Behavioral task
behavioral1
Sample
3ba4a47119e0314cb8474bbce908bf37_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3ba4a47119e0314cb8474bbce908bf37_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
3ba4a47119e0314cb8474bbce908bf37_JaffaCakes118
Size
27KB
MD5
3ba4a47119e0314cb8474bbce908bf37
SHA1
68d302421d04c515435404592ad6edac315acf01
SHA256
785fb8828a76557e4241058694708df1ed80b4e55b9d5bfef3923bd3786f3a54
SHA512
2c292144a526644dad219ea0617af987f2a9b56ebf4b2a47080698097ca410a10d2f0f875d5e2454b811ee2d22030a822137e464bdf5e9763c6db37a179090c7
SSDEEP
384:0X6r9OAUHgVGn3FjgdLCYHq9wiCNDvtdp/QDOLRm+f73QoO6Miw2qve:0ZkVu3FoZKwiuDv1/IkYww6lnqv
Checks for missing Authenticode signature.
resource |
---|
3ba4a47119e0314cb8474bbce908bf37_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
ReadFile
CreateFileA
GetTempPathA
VirtualAlloc
GetCommandLineA
WriteFile
IsBadReadPtr
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GetModuleFileNameA
ExitProcess
InitializeCriticalSection
VirtualProtectEx
VirtualProtect
GetPrivateProfileStringA
WideCharToMultiByte
CloseHandle
EnterCriticalSection
ReadProcessMemory
SetUnhandledExceptionFilter
SetThreadContext
OpenThread
MultiByteToWideChar
TerminateProcess
CreateProcessA
GetCurrentThreadId
GetCurrentProcess
GetLocalTime
DeleteFileA
Sleep
VirtualAllocEx
TerminateThread
CreateThread
GetCurrentProcessId
CreateMutexA
GetLastError
GetModuleHandleA
LoadLibraryA
LeaveCriticalSection
GetProcAddress
GetWindowTextA
CallNextHookEx
GetAsyncKeyState
ToAscii
GetWindowThreadProcessId
_stricmp
_strcmpi
_strupr
_strlwr
strcat
sprintf
strcpy
strlen
strncpy
strstr
strcmp
??2@YAPAXI@Z
memcpy
memset
wcslen
strrchr
??3@YAXPAX@Z
strchr
__CxxFrameHandler
cfds
fdsce
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ