fa
fb
Static task
static1
Behavioral task
behavioral1
Sample
5efec590ec6e4f7c0341c45837f350b5_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
5efec590ec6e4f7c0341c45837f350b5_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
5efec590ec6e4f7c0341c45837f350b5_JaffaCakes118
Size
7KB
MD5
5efec590ec6e4f7c0341c45837f350b5
SHA1
33e4ad32f7aa7b096429b6077920c4db741ac86a
SHA256
d372cb702c1761bc3a6ce62d69a92105b5d85a75655c07a7a2d0ec77e5129f89
SHA512
c3498a18a2ad296ddde64f48ea236ffa3ca58712eee4a7c60d92c8c4f9682d468f16208b24fe015e4312899ee26780001ba1bc802db8a4b155e3b957adbd7217
SSDEEP
96:IjHePfylMBXbKCtGHnCYyLbodEx3zIAEFGLXso6SmGDICzjZ+raLjxF:Iy39eCtlHhIAWqYSmGDIglXLj
Checks for missing Authenticode signature.
resource |
---|
5efec590ec6e4f7c0341c45837f350b5_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
CreateThread
Sleep
GetComputerNameA
WriteProcessMemory
ReadProcessMemory
GetCurrentProcess
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
CloseHandle
GetCurrentProcessId
GetModuleFileNameA
ExitProcess
CallNextHookEx
GetWindowThreadProcessId
FindWindowA
GetWindowTextA
UnhookWindowsHookEx
SetWindowsHookExA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
strlen
_adjust_fdiv
malloc
_initterm
strrchr
memset
??2@YAPAXI@Z
??3@YAXPAX@Z
sprintf
strcpy
strcmp
strcat
_stricmp
strncpy
strchr
free
InternetOpenA
InternetOpenUrlA
InternetCloseHandle
fa
fb
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ