CancelDll
LoadDll
Static task
static1
Behavioral task
behavioral1
Sample
5ca90d0ed5841184b5d5d240b898ed66_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
5ca90d0ed5841184b5d5d240b898ed66_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
5ca90d0ed5841184b5d5d240b898ed66_JaffaCakes118
Size
106KB
MD5
5ca90d0ed5841184b5d5d240b898ed66
SHA1
fa6e15deb56228192a9682cb349fe8da1379c826
SHA256
d1e0c22d862f5e77be8f90c1f75ed18eec86a251d4f669a784fcadc4890b2e17
SHA512
89efd8ff2d30da8c0c6b729c4b720d0eb23165357b48808e54bbe4151f4883fdb474a611c7d7cb0ab560eeae028478b5889770449c69071ba314ef7fef7fc65f
SSDEEP
1536:s3wRyhcKCEPfqnpOWt958yICZ3yACAZehX5l0n7646AyiwG:sA4hcKJPfqnBitKCpl0nh6ATwG
Checks for missing Authenticode signature.
resource |
---|
5ca90d0ed5841184b5d5d240b898ed66_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
_strcmpi
_vsnprintf
tolower
memset
memcpy
exit
strrchr
wcsstr
wcscpy
wcsncat
strcpy
strstr
wcslen
time
srand
rand
strcat
free
strchr
strncpy
_except_handler3
malloc
mbstowcs
fopen
fseek
ftell
fclose
??2@YAPAXI@Z
wcscmp
??3@YAXPAX@Z
strlen
sprintf
_strupr
GetAdaptersInfo
BitBlt
DeleteObject
DeleteDC
CreateCompatibleBitmap
CreateCompatibleDC
GetDeviceCaps
CreateDCA
SelectObject
GetModuleHandleA
GetFileSize
ReadFile
WideCharToMultiByte
GetFileAttributesW
GetTempPathA
DeleteFileA
Sleep
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
LoadLibraryA
FreeLibrary
HeapAlloc
GetProcessHeap
MultiByteToWideChar
lstrlenA
CloseHandle
SetFilePointer
GetWindowRect
wsprintfA
GetWindowTextA
FindWindowA
GetWindow
GetClassNameW
CallNextHookEx
SetWindowsHookExA
UnhookWindowsHookEx
GetDC
CancelDll
LoadDll
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE