ggg
hhh
Static task
static1
Behavioral task
behavioral1
Sample
47609d41c424965f3989ad97086af2c8_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
47609d41c424965f3989ad97086af2c8_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
47609d41c424965f3989ad97086af2c8_JaffaCakes118
Size
27KB
MD5
47609d41c424965f3989ad97086af2c8
SHA1
56d36f3f5afffc85468872bcb7e9b5f56f28bde6
SHA256
dcd35b2c5767e414de2e280b5bf1f8d1e627a89b761ec4bddd76d1a977d4df9a
SHA512
b1cd94f09a7283d47a3993ce4d361a49078c1c2fc839f8a9bd3bc5e42142269b3161f77fa779eb5849d069b490365dd8d2c03f58a96baa6ab3810170414e10c7
SSDEEP
384:KmcZ8Jc+ZsDZvD1KYRq/vkpFtyBk2q02IXH475w/eyBOC3VMALigM6W0besIMGza:sZ8VZ2D1KF/2nqXA5VyoC3X+Z8eysY
Checks for missing Authenticode signature.
resource |
---|
47609d41c424965f3989ad97086af2c8_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetLastError
CreateMutexA
GetCurrentProcessId
GetPrivateProfileStringA
GetModuleHandleA
ReadProcessMemory
SetUnhandledExceptionFilter
SetThreadContext
OpenThread
GetProcAddress
WideCharToMultiByte
MultiByteToWideChar
TerminateProcess
CreateProcessA
VirtualAlloc
LoadLibraryA
ExitProcess
GetSystemDirectoryA
GetCurrentThreadId
GetModuleFileNameA
WriteFile
DeleteFileA
InitializeCriticalSection
VirtualProtectEx
VirtualProtect
LeaveCriticalSection
EnterCriticalSection
WriteProcessMemory
CreateFileA
SetFilePointer
ReadFile
CloseHandle
Sleep
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
GetCommandLineA
IsBadReadPtr
TerminateThread
GetCurrentProcess
CreateThread
GetForegroundWindow
GetWindowThreadProcessId
CallNextHookEx
SetWindowsHookExA
UnhookWindowsHookEx
FindWindowA
GetWindowTextA
InternetCloseHandle
InternetReadFile
strcmp
wcslen
_strupr
_stricmp
_strlwr
_strcmpi
fopen
fread
fclose
strstr
??2@YAPAXI@Z
memcpy
strrchr
memset
strcat
sprintf
strcpy
strlen
atoi
??3@YAXPAX@Z
strncpy
strchr
ggg
hhh
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ