fa
fc
Static task
static1
Behavioral task
behavioral1
Sample
479a2953b394cbd8176807ef460d8cad_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
479a2953b394cbd8176807ef460d8cad_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
479a2953b394cbd8176807ef460d8cad_JaffaCakes118
Size
9KB
MD5
479a2953b394cbd8176807ef460d8cad
SHA1
62c5f26a851d2d5f179afe6ec5a1501585fc9fb0
SHA256
b6b5a1253389be0ef4714e0f8742f19dbc07278f42ea236c4829aaaf4f41d203
SHA512
4c097bbbfc9057782197273f4a9f677787a6fc59e118ffccdfc19bf9c393d0f3313b05b61a5877205abfa54b13f997562bd736fd50beb4fcad59f5b95704789c
SSDEEP
96:0apT99PQtwnBnb/I8Y6kvTUbmIe3fEICr2c/dd1I4TXmEaflB+I6g53:0aP9ItsbuDIy/RwWLn+It53
Checks for missing Authenticode signature.
resource |
---|
479a2953b394cbd8176807ef460d8cad_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
ReadProcessMemory
GlobalLock
GlobalAlloc
CreateThread
GlobalFree
IsBadReadPtr
GetPrivateProfileStringA
Sleep
WriteProcessMemory
GetModuleFileNameA
GetCurrentProcess
WideCharToMultiByte
UnhookWindowsHookEx
CallNextHookEx
SetWindowsHookExA
InternetCloseHandle
InternetOpenUrlA
InternetOpenA
InternetReadFile
_adjust_fdiv
_stricmp
malloc
_initterm
free
memset
??3@YAXPAX@Z
strcat
strrchr
strcpy
sprintf
??2@YAPAXI@Z
strlen
memcpy
fa
fc
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ