EbvMffqOqouphcWllzm
Oywm
JcHkzxIwxrKhw
Static task
static1
Behavioral task
behavioral1
Sample
3c9c7ca6683ace47567c8bf468630087_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3c9c7ca6683ace47567c8bf468630087_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
3c9c7ca6683ace47567c8bf468630087_JaffaCakes118
Size
62KB
MD5
3c9c7ca6683ace47567c8bf468630087
SHA1
b5c6b94f4a750408d316da64171fa14af3be3981
SHA256
977b16ca3813a5a0fbb3e1954c3fd3928eb5f94458febcf227183c010b1a1821
SHA512
57f86df2dd3d1291e5c4899855db0b9ec8a0d6dbf2f778b0e7cb872714315b0e67c940045c0a783ec4d2fdebf2ed8d967509b1803d65bbc3eb74b35016ce09b6
SSDEEP
1536:ic+0f4rpmtI+xioAn0ckZGT9mQZeLvM8+C9kIB7RyksqDwLKb:Y0wG3kn0HZ6dZ2vLJBVBdwL
Checks for missing Authenticode signature.
resource |
---|
3c9c7ca6683ace47567c8bf468630087_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetStringTypeExW
FindAtomA
CreateWaitableTimerW
GetCurrentDirectoryW
VirtualAlloc
GetFileTime
CreateWaitableTimerA
GetLastError
GetTempPathW
GetModuleHandleA
GetFileSizeEx
CopyFileA
LocalReAlloc
ExitProcess
DisableThreadLibraryCalls
LoadLibraryA
OutputDebugStringA
LocalHandle
VirtualProtect
_pipe
??0bad_typeid@@QAE@ABV0@@Z
getc
_mbctype
sprintf
wcslen
memcpy
__iscsymf
_ismbbpunct
setbuf
GetNextDlgTabItem
LoadStringA
ModifyMenuA
SetWindowPlacement
CheckMenuItem
RemoveMenu
DestroyWindow
MonitorFromRect
DrawMenuBar
UpdateWindow
LoadStringW
TranslateMessage
EnumDisplayMonitors
LoadCursorFromFileA
SetFocus
GetMessageW
OffsetRect
OpenClipboard
GetObjectW
GetDIBits
CreatePatternBrush
SetDIBitsToDevice
GetNearestPaletteIndex
MoveToEx
SetBrushOrgEx
EqualRgn
GetTextExtentPoint32W
CreateSolidBrush
EbvMffqOqouphcWllzm
Oywm
JcHkzxIwxrKhw
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ