_ClearFlag@0
_Start@12
_Stop@0
Static task
static1
Behavioral task
behavioral1
Sample
439040e18f213efe29c3436a72c3c737_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
439040e18f213efe29c3436a72c3c737_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
439040e18f213efe29c3436a72c3c737_JaffaCakes118
Size
50KB
MD5
439040e18f213efe29c3436a72c3c737
SHA1
23724bd5042b9c31c46ba3ab032af7e866cb8829
SHA256
3c1f42d666a88914be1493f6fe51650812b7199809d1e941b0d23ef79a50bee1
SHA512
6ea0f84032fa0e6f40e9f2bd7c475828c3c16b2006c9447c8dd71440dced03de01e93e0acc8462d78bbf5067d182a9b28c1cd7bb515e27c9ae2eaab0200f1e03
SSDEEP
768:mSGpP5AHWuvpTY/tHwU9ti5jEAIHS7HOQTivUwldj1OnOq4AeKrvLuGq88O3L2NN:lGp/XHdtGQCpTAUUdjm+AeKrXKOLNo
Checks for missing Authenticode signature.
resource |
---|
439040e18f213efe29c3436a72c3c737_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
MapViewOfFile
CreateFileMappingA
UnmapViewOfFile
CloseHandle
WriteProcessMemory
OpenProcess
GetCurrentProcessId
GetTickCount
WideCharToMultiByte
MultiByteToWideChar
ReadProcessMemory
lstrcmpiA
lstrcpyA
lstrcpynA
lstrlenA
FlushViewOfFile
OpenFileMappingA
FlushFileBuffers
GetStringTypeW
GetCommandLineA
GetVersion
HeapFree
HeapAlloc
ExitProcess
TerminateProcess
GetCurrentProcess
HeapReAlloc
HeapSize
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
GetLastError
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
GetModuleHandleA
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
WriteFile
VirtualAlloc
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
RtlUnwind
SetFilePointer
InterlockedDecrement
InterlockedIncrement
GetCPInfo
GetACP
GetOEMCP
GetProcAddress
LoadLibraryA
SetStdHandle
LCMapStringA
LCMapStringW
GetStringTypeA
SetWindowsHookExA
CallNextHookEx
PostMessageA
FindWindowExA
GetWindow
GetDlgCtrlID
SendMessageA
UnhookWindowsHookEx
htonl
_ClearFlag@0
_Start@12
_Stop@0
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ