fa
fc
Static task
static1
Behavioral task
behavioral1
Sample
5d67ff183f865c4ede044f74504bb71b_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
5d67ff183f865c4ede044f74504bb71b_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
5d67ff183f865c4ede044f74504bb71b_JaffaCakes118
Size
8KB
MD5
5d67ff183f865c4ede044f74504bb71b
SHA1
17b2e4ccb7cec06db08caa007d14ae8343761a7c
SHA256
676cd91524de36c990a24a4c1eba7beb0f890efa1dff7eba2d49fc636dfa97eb
SHA512
2fe09ac5eb3899a07aed44484354fd613e5e56279d2480eddc7eb8fbc152270d35dee028ddcf707b7c59996eda5c56eb1f9516297856f48609d9b5e99836aefb
SSDEEP
96:trzJjUQOWaCkhwoykLe5T4AXOmGMfEj/rve+FUcoEJEafl0cvnI:xJjUQ9ehwgUOp9nimLScvI
Checks for missing Authenticode signature.
resource |
---|
5d67ff183f865c4ede044f74504bb71b_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
WideCharToMultiByte
IsBadReadPtr
GetPrivateProfileStringA
Sleep
ReadProcessMemory
CreateThread
GlobalFree
GlobalLock
GlobalAlloc
GetModuleFileNameA
GetCurrentProcess
WriteProcessMemory
SetWindowsHookExA
CallNextHookEx
UnhookWindowsHookEx
InternetReadFile
InternetCloseHandle
InternetOpenUrlA
InternetOpenA
sprintf
_adjust_fdiv
malloc
_initterm
free
memset
??3@YAXPAX@Z
strrchr
strcpy
_stricmp
??2@YAPAXI@Z
strlen
memcpy
fa
fc
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ