DllMain
fltInfo
fltLoad
fltSave
Static task
static1
Behavioral task
behavioral1
Sample
4b9552212734ea941b90af8351dbd906_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
4b9552212734ea941b90af8351dbd906_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
4b9552212734ea941b90af8351dbd906_JaffaCakes118
Size
140KB
MD5
4b9552212734ea941b90af8351dbd906
SHA1
580bece2e6bc8d980927760247ab038c765a12bd
SHA256
bb851375ee88f9b7b990cfc4f7edbc7bafef5a810212cdfc2085f4eb3885361b
SHA512
af89b42f6af99c4961de2a7098ed63acad755e084b5ec4aa3c1cdcb733a98ca653023efc4c90a38f66bce28e85a21d5aba8463b3b6a9969f5464b2f3a5dce17c
SSDEEP
3072:oJ8VplJ13yEpSkHAU0GpiZoAP5PtXr49OybsygiTLpOlRb5Fnw5Z5ad:ooRxpUgpDAtzbipYRDwzE
Checks for missing Authenticode signature.
resource |
---|
4b9552212734ea941b90af8351dbd906_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
TlsSetValue
TlsAlloc
lstrcpyA
SetFilePointer
SetStdHandle
CloseHandle
FlushFileBuffers
LoadLibraryA
HeapFree
HeapAlloc
GetCommandLineA
GetProcAddress
GetModuleHandleA
GetVersion
HeapDestroy
HeapCreate
VirtualFree
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
ExitProcess
VirtualAlloc
TerminateProcess
GetCurrentProcess
GetCurrentThreadId
GetModuleFileNameA
TlsFree
SetLastError
TlsGetValue
GetLastError
SetHandleCount
GetFileType
GetStdHandle
GetStartupInfoA
GetCPInfo
GetACP
GetOEMCP
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
WideCharToMultiByte
WriteFile
ord192
ord162
ord189
ord188
ord191
ord190
DllMain
fltInfo
fltLoad
fltSave
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE