Install
Test
Static task
static1
Behavioral task
behavioral1
Sample
4197499923ab6125e2ee5e950b21ec91_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
4197499923ab6125e2ee5e950b21ec91_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
4197499923ab6125e2ee5e950b21ec91_JaffaCakes118
Size
59KB
MD5
4197499923ab6125e2ee5e950b21ec91
SHA1
8ed42f81a8df1fbc67564ec8fe30f06c9e737ea8
SHA256
2c9e308a1e1fcce04a43254a602393bfec9cfb24fab16acb934c912338920215
SHA512
41f40a1fd4169c2ebeab7c87a48145002fb00d2e5f26467c094a601e7b9a69bf89b8cfc02838a93ebfc753cb113d3bdd4bdeb7bcc31cbe0b4bc1736eafe06126
SSDEEP
1536:G3lz4jLdT41ZmAZF2sIFUYQbvNkXHt6Tf:G3SjLdT2IAZ9SQbvNsM
Checks for missing Authenticode signature.
resource |
---|
4197499923ab6125e2ee5e950b21ec91_JaffaCakes118 |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
ReadFile
Sleep
GetLastError
MapViewOfFile
CreateFileMappingA
GetFileSizeEx
SetLastError
GetCurrentThreadId
FlsSetValue
GetCommandLineA
HeapReAlloc
RtlUnwindEx
RaiseException
RtlPcToFileHeader
RtlLookupFunctionEntry
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RtlVirtualUnwind
RtlCaptureContext
EncodePointer
FlsGetValue
FlsFree
FlsAlloc
GetModuleHandleW
ExitProcess
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
GetStartupInfoW
DeleteCriticalSection
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapSetInformation
GetVersion
HeapCreate
HeapDestroy
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
LCMapStringW
LeaveCriticalSection
EnterCriticalSection
LoadLibraryW
GetModuleFileNameW
HeapSize
GetStringTypeW
GetConsoleCP
GetConsoleMode
SetStdHandle
WriteConsoleW
CreateFileW
FlushFileBuffers
CreateFileA
SetFilePointer
WriteFile
UnmapViewOfFile
CloseHandle
WideCharToMultiByte
MultiByteToWideChar
HeapAlloc
FreeLibrary
HeapFree
IsBadReadPtr
GetModuleHandleA
GetProcAddress
OutputDebugStringA
DecodePointer
GetModuleFileNameA
Install
Test
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ