entry
first
Static task
static1
Behavioral task
behavioral1
Sample
412c8a2a6af54f1af6f8608168536dfe_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
412c8a2a6af54f1af6f8608168536dfe_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
412c8a2a6af54f1af6f8608168536dfe_JaffaCakes118
Size
125KB
MD5
412c8a2a6af54f1af6f8608168536dfe
SHA1
9864e3a21b46a552660617f0c63c5c43b5c06d7a
SHA256
db0798c521a995a822313875588c0999f99cffdcf45b2e17bb790a4aad718ffa
SHA512
3453a319bc176797669647e41dbbd929e496b964e60f9ee213f3a84af1b545ad821853cac9929fa9e818ada52f20ad2e3e6903def7af5228bdf6046cd3ae8cad
SSDEEP
3072:YY+3h6zhKn/WYhX7GUGz3J2YFBQ6U888888888888W88888888888:YY+QzhK/XeFBi888888888888W88888P
Checks for missing Authenticode signature.
resource |
---|
412c8a2a6af54f1af6f8608168536dfe_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
SysFreeString
SysReAllocStringLen
SysAllocStringLen
SafeArrayPtrOfIndex
SafeArrayGetUBound
SafeArrayGetLBound
SafeArrayCreate
VariantChangeType
VariantCopy
VariantClear
VariantInit
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
GetKeyboardType
LoadStringW
MessageBoxA
CharNextW
wvsprintfW
MessageBoxW
LoadStringW
GetWindowThreadProcessId
GetSystemMetrics
FindWindowW
CharUpperBuffW
CharToOemW
GetACP
Sleep
VirtualFree
VirtualAlloc
GetSystemInfo
GetTickCount
QueryPerformanceCounter
GetVersion
GetCurrentThreadId
VirtualQuery
WideCharToMultiByte
MultiByteToWideChar
lstrlenW
lstrcpynW
LoadLibraryExW
GetThreadLocale
GetStartupInfoA
GetProcAddress
GetModuleHandleW
GetModuleFileNameW
GetLocaleInfoW
GetCommandLineW
FreeLibrary
FindFirstFileW
FindClose
ExitProcess
WriteFile
UnhandledExceptionFilter
RtlUnwind
RaiseException
GetStdHandle
CloseHandle
TlsSetValue
TlsGetValue
TlsFree
TlsAlloc
LocalFree
LocalAlloc
WriteFile
WaitForSingleObject
VirtualQuery
Sleep
SignalObjectAndWait
SetEvent
ResetEvent
ReadProcessMemory
OpenProcess
MultiByteToWideChar
LeaveCriticalSection
InitializeCriticalSection
GetWindowsDirectoryW
GetVersionExW
GetThreadLocale
GetStdHandle
GetProcAddress
GetModuleHandleW
GetModuleFileNameW
GetLocaleInfoW
GetLocalTime
GetDiskFreeSpaceW
GetDateFormatW
GetCPInfo
InterlockedExchange
InterlockedCompareExchange
FreeLibrary
FormatMessageW
ExitProcess
EnumCalendarInfoA
EnterCriticalSection
DeleteCriticalSection
CreateEventW
CompareStringW
CloseHandle
InternetReadFile
InternetOpenUrlW
InternetOpenW
InternetCloseHandle
ShellExecuteW
entry
first
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ