afdfsd
fxxdc
Static task
static1
Behavioral task
behavioral1
Sample
4c62d643ceffd46aeb3c041910bb5c77_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
4c62d643ceffd46aeb3c041910bb5c77_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
4c62d643ceffd46aeb3c041910bb5c77_JaffaCakes118
Size
40KB
MD5
4c62d643ceffd46aeb3c041910bb5c77
SHA1
f1776732678625435f8c3beb07392da4e7c52e7f
SHA256
c3654e885d9d3fa9588503ac266933d3d9f67a4902f63a596898e083f12135df
SHA512
53b1afe9dabae227d7908368b0453346f8c74b99248cadaf511014e6a1fb694dd15e380227566661ac918440d1bd5c6254ed5f805be8c08fe5c2cc97faca34f0
SSDEEP
384:GBZtuc+vTfuDAPiE/grmcI9lpqsL5FOi2HOTlSQWcTBM7CRKkm5u8H1:GnthZDHE/4OGWxTl6cs+xm5zH1
Checks for missing Authenticode signature.
resource |
---|
4c62d643ceffd46aeb3c041910bb5c77_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
CreateFileA
GetModuleFileNameA
GetLastError
CreateMutexA
GetCurrentProcessId
GetPrivateProfileStringA
ReadProcessMemory
SetUnhandledExceptionFilter
SetThreadContext
OpenThread
WideCharToMultiByte
MultiByteToWideChar
TerminateProcess
CreateProcessA
VirtualAlloc
LoadLibraryA
ExitProcess
ReadFile
GetCurrentProcess
WriteFile
DeleteFileA
InitializeCriticalSection
VirtualProtectEx
VirtualProtect
LeaveCriticalSection
EnterCriticalSection
CloseHandle
Sleep
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
GetCommandLineA
IsBadReadPtr
TerminateThread
CreateThread
GetModuleHandleA
GetProcAddress
GetCurrentThreadId
CallNextHookEx
GetWindowThreadProcessId
GetWindowTextA
_stricmp
_strupr
_strlwr
_strcmpi
_strnicmp
sprintf
??2@YAPAXI@Z
memcpy
strrchr
memset
strcat
strcpy
strlen
??3@YAXPAX@Z
strncpy
strchr
strstr
strcmp
__CxxFrameHandler
wcslen
afdfsd
fxxdc
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ