iii
jjj
Static task
static1
Behavioral task
behavioral1
Sample
4076bb5797be8bff133b38d9312c93a7_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
4076bb5797be8bff133b38d9312c93a7_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
4076bb5797be8bff133b38d9312c93a7_JaffaCakes118
Size
27KB
MD5
4076bb5797be8bff133b38d9312c93a7
SHA1
b91dd0d6bfd5e083103a5abfa58a0d98f131c456
SHA256
f8b003197d4bcb49ec848a419ea251de2ceb42b5420f47163f021ad9a55a8267
SHA512
6bd5e7d7c765a34481f473581821e5eeb6de0ea68268ee8bfbe3fca57674947d7da8ad8b057e25212e6bac4a3bf1540f14f32c9a44c23e3d0e1e6ba59abd16fe
SSDEEP
384:wRZuU2SpQOcCna1ZsZyAgbzYClDADiLu/OSwzuR/Q1WEtqgExvu:wRcUbO7h7sZ3c7lDe/OSt1NEtax
Checks for missing Authenticode signature.
resource |
---|
4076bb5797be8bff133b38d9312c93a7_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
CreateFileA
GetTempPathA
VirtualAlloc
GetCommandLineA
WriteFile
IsBadReadPtr
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
SetFilePointer
GetModuleFileNameA
ExitProcess
InitializeCriticalSection
VirtualProtectEx
VirtualProtect
GetPrivateProfileStringA
WideCharToMultiByte
LeaveCriticalSection
EnterCriticalSection
ReadFile
ReadProcessMemory
SetUnhandledExceptionFilter
SetThreadContext
OpenThread
MultiByteToWideChar
TerminateProcess
CreateProcessA
GetSystemDirectoryA
GetCurrentThreadId
GetCurrentProcess
CloseHandle
GetLocalTime
DeleteFileA
Sleep
GetModuleHandleA
GetProcAddress
VirtualAllocEx
TerminateThread
CreateThread
GetCurrentProcessId
CreateMutexA
LoadLibraryA
GetLastError
UnhookWindowsHookEx
SetWindowsHookExA
GetForegroundWindow
GetWindowTextA
FindWindowA
ToAscii
CallNextHookEx
GetAsyncKeyState
GetWindowThreadProcessId
strchr
fclose
fread
fopen
_stricmp
_strcmpi
_strupr
_strlwr
??3@YAXPAX@Z
strcat
sprintf
strcpy
strlen
strncpy
strstr
strcmp
??2@YAPAXI@Z
memcpy
memset
wcslen
strrchr
iii
jjj
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ