CancelDll
LoadDll
Static task
static1
Behavioral task
behavioral1
Sample
4d7f669b29e2c493cb0faf6dec6dcdf5_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
4d7f669b29e2c493cb0faf6dec6dcdf5_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
4d7f669b29e2c493cb0faf6dec6dcdf5_JaffaCakes118
Size
105KB
MD5
4d7f669b29e2c493cb0faf6dec6dcdf5
SHA1
30b7cc04a2437b76b1e2aef2917c90e74e432b4d
SHA256
02fd55ee5956d38ff0bd714541d93a5c716fd9ab16b61683f37d49f758614a10
SHA512
a8713b7bbfe26fb9449b499aac8b2aac4755225b954a57acf01331097b76c7a65158c19991ad5fddc0b4e2a4ac52d890f0cd0c60bc815905a79f1c39a66a0b79
SSDEEP
1536:Eh1T6DE3TEYkJUpltxY7uY9yOXOObgp1hiAKjuzK0s:EfEYkJwOjgF+uzLs
Checks for missing Authenticode signature.
resource |
---|
4d7f669b29e2c493cb0faf6dec6dcdf5_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
??2@YAPAXI@Z
wcscmp
fclose
strcpy
sprintf
memset
ftell
fseek
_vsnprintf
tolower
_except_handler3
memcpy
malloc
exit
strrchr
wcsstr
wcscpy
wcsncat
strstr
time
srand
rand
strcat
wcslen
strcmp
strncpy
free
_stricmp
strlen
mbstowcs
??3@YAXPAX@Z
fopen
_strupr
_strcmpi
CreateDCA
GetDeviceCaps
CreateCompatibleDC
CreateCompatibleBitmap
SelectObject
BitBlt
DeleteObject
DeleteDC
MultiByteToWideChar
GetModuleHandleA
GetProcessHeap
HeapAlloc
SetFilePointer
CloseHandle
GetFileSize
ReadFile
WideCharToMultiByte
GetFileAttributesW
GetTempPathA
DeleteFileA
GetModuleFileNameA
GetPrivateProfileStringA
Sleep
OpenProcess
TerminateProcess
GetCurrentProcess
LoadLibraryA
FreeLibrary
lstrlenA
wsprintfA
GetWindow
GetClassNameW
CallNextHookEx
SetWindowsHookExA
UnhookWindowsHookEx
GetDC
GetWindowRect
CancelDll
LoadDll
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE