PlayWork
Wins32
Static task
static1
Behavioral task
behavioral1
Sample
5bfba2e749f0d6f406977a5d40a8e228_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
5bfba2e749f0d6f406977a5d40a8e228_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
5bfba2e749f0d6f406977a5d40a8e228_JaffaCakes118
Size
36KB
MD5
5bfba2e749f0d6f406977a5d40a8e228
SHA1
1e46718eb519efce6b802664ddc8eabfc7eb9ac3
SHA256
e229463e278311563dade3352811c51cd3024fdbd787d781b1919a2d20927169
SHA512
95869ff2eeb964c5086c3759da34a39e35ffb7f5b5a90da6c49ad01b918e1fad6312502aaa80eb7acc7de1abf455f5ad2d8eac60bd6de724ba2393ebb24137be
SSDEEP
768:30dUQW8u8fXc0/ZNqwKC313T+hDbFyTrI:BouSXN/ZNqb0cC
Checks for missing Authenticode signature.
resource |
---|
5bfba2e749f0d6f406977a5d40a8e228_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
FindNextFileW
FindFirstFileW
lstrcmpW
Sleep
WriteFile
ReadFile
GetFileSize
CreateFileW
DeleteFileW
MultiByteToWideChar
lstrlenA
WideCharToMultiByte
GetComputerNameW
FindClose
CreateMutexW
lstrcpyA
GetTempFileNameW
GetTempPathW
WinExec
CopyFileW
FreeLibrary
GetProcAddress
LoadLibraryW
GetShortPathNameW
CreateThread
SetEvent
OpenEventW
GetCurrentProcessId
lstrcmpA
LocalFree
GetLastError
CloseHandle
lstrcpyW
lstrcmpiW
lstrcatW
ReleaseMutex
lstrlenW
UnhookWindowsHookEx
SetWindowsHookExW
CallNextHookEx
memmove
__CxxFrameHandler
strstr
_initterm
_adjust_fdiv
memcpy
sprintf
mbstowcs
swprintf
malloc
free
strlen
memset
rand
??2@YAPAXI@Z
??3@YAXPAX@Z
_CxxThrowException
wcstombs
??1type_info@@UAE@XZ
HttpSendRequestExW
HttpEndRequestW
InternetCloseHandle
InternetSetOptionW
HttpOpenRequestW
InternetConnectW
InternetOpenW
HttpQueryInfoW
InternetGetConnectedState
CryptUnprotectData
RegQueryValueExW
OpenSCManagerW
EnumServicesStatusW
CloseServiceHandle
RegEnumKeyExW
RegOpenKeyExW
RegCloseKey
inet_ntoa
WSAStartup
gethostbyname
ntohs
WSACleanup
GetErrorInfo
NetServerEnum
NetUserEnum
NetApiBufferFree
GetIpAddrTable
GetNumberOfInterfaces
GetTcpTable
WNetOpenEnumW
WNetCloseEnum
WNetEnumResourceW
SHGetSpecialFolderPathW
PlayWork
Wins32
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ