ggg
hhh
Static task
static1
Behavioral task
behavioral1
Sample
5b764e7170c12d37d44488eb32e5018e_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
5b764e7170c12d37d44488eb32e5018e_JaffaCakes118.dll
Resource
win10v2004-20240704-en
Target
5b764e7170c12d37d44488eb32e5018e_JaffaCakes118
Size
25KB
MD5
5b764e7170c12d37d44488eb32e5018e
SHA1
c66190240cb0a796f092b95153805b27e21fb887
SHA256
844069d3234135be206583c7eee8c63adad2d7c2e9fb4e690c1116ac4b3628a1
SHA512
8c0b7ca2ee8ebf35639ecb805d1439c63b2ab5586c81aca359933f5c35e13e63ad289d44b28a3ae306b2f0dde22dc394a2068daa5e1a8cceb64548c4773d5df5
SSDEEP
768:Tx8yyGDF/FPuooEBKwbCt4GhyCsZ8Sez:F8yywOooOjC9z
Checks for missing Authenticode signature.
resource |
---|
5b764e7170c12d37d44488eb32e5018e_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetModuleFileNameA
GetLastError
CreateMutexA
GetCurrentProcessId
GetPrivateProfileStringA
GetModuleHandleA
ReadProcessMemory
SetUnhandledExceptionFilter
SetThreadContext
OpenThread
GetProcAddress
WideCharToMultiByte
MultiByteToWideChar
TerminateProcess
CreateProcessA
VirtualAlloc
LoadLibraryA
ExitProcess
GetSystemDirectoryA
CreateFileA
GetCurrentProcess
WriteFile
DeleteFileA
InitializeCriticalSection
VirtualProtectEx
VirtualProtect
LeaveCriticalSection
EnterCriticalSection
SetFilePointer
ReadFile
CloseHandle
Sleep
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
GetCommandLineA
IsBadReadPtr
TerminateThread
CreateThread
GetCurrentThreadId
SetWindowsHookExA
UnhookWindowsHookEx
FindWindowA
CallNextHookEx
GetWindowTextA
GetWindowThreadProcessId
GetForegroundWindow
strcmp
wcslen
_stricmp
_strupr
_strlwr
_strcmpi
fopen
sprintf
??2@YAPAXI@Z
memcpy
strrchr
memset
strcat
strcpy
strlen
??3@YAXPAX@Z
strncpy
strchr
strstr
fclose
fread
ggg
hhh
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ