ChatInfoManagerDestroy
ChaterInfoMgrQuery
Static task
static1
Behavioral task
behavioral1
Sample
5ec85872de5f94546f5f186ab35b9bb4_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
5ec85872de5f94546f5f186ab35b9bb4_JaffaCakes118.dll
Resource
win10v2004-20240704-en
Target
5ec85872de5f94546f5f186ab35b9bb4_JaffaCakes118
Size
18KB
MD5
5ec85872de5f94546f5f186ab35b9bb4
SHA1
d2bbba39eb209fbd65cac8920a43b88bf0e7706b
SHA256
e2f98cb7d67b0630a4dab6b336e419942bef901f0cd2688e7c090b242a6e4ed3
SHA512
6c8bb313b32d304388e3c31e48f68abf338b29fab248c47bc216296677820d1a15ae9c7b9ee55eb96e9bc800fbf93e7e0400dc057f38ec8f7ada7cc8f16aba66
SSDEEP
192:fA0ZPGUrSFSSO/Z3WcCgL6DF/Olw00JZH19/Q7U4cdjZXKr89E/HgoGS5i1BVe:Yver80L6lOAJd/Qre1XBu/HVG8eVe
Checks for missing Authenticode signature.
resource |
---|
5ec85872de5f94546f5f186ab35b9bb4_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetLastError
CreateMutexA
OpenProcess
GetCurrentProcessId
VirtualFreeEx
WaitForSingleObject
CreateRemoteThread
LoadLibraryA
WriteProcessMemory
VirtualAllocEx
FindClose
FindNextFileA
lstrcpynA
lstrcpyA
lstrcmpA
FindFirstFileA
VirtualProtectEx
ReleaseMutex
Module32First
ReadFile
GetModuleFileNameA
FreeLibrary
CreateThread
Sleep
MoveFileExA
WinExec
TerminateProcess
GetCurrentProcess
CreateToolhelp32Snapshot
Process32First
lstrcmpiA
Process32Next
GetSystemDirectoryA
lstrlenA
GetModuleHandleA
GetProcAddress
WriteFile
CloseHandle
GetTempPathA
Module32Next
GetTickCount
wsprintfA
MapVirtualKeyA
GetKeyboardState
SetThreadDesktop
OpenDesktopA
SetProcessWindowStation
OpenWindowStationA
ToAscii
GetKeyState
VkKeyScanA
OpenProcessToken
AdjustTokenPrivileges
LookupPrivilegeValueA
StrStrIA
InternetCloseHandle
_itoa
strcmp
_purecall
strncpy
memcpy
??2@YAPAXI@Z
strstr
strncat
strcat
strlen
memset
strcpy
??3@YAXPAX@Z
ChatInfoManagerDestroy
ChaterInfoMgrQuery
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ