fa
fc
Static task
static1
Behavioral task
behavioral1
Sample
5faf3743b56e6cca97b46d790b4b246c_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
5faf3743b56e6cca97b46d790b4b246c_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
5faf3743b56e6cca97b46d790b4b246c_JaffaCakes118
Size
8KB
MD5
5faf3743b56e6cca97b46d790b4b246c
SHA1
4bb0b2a7888cb3f6a0ce982b1775a9cfd7a3803f
SHA256
4ff5974647dd4bb4cacbfc7ab2182b2d11e49b032cf6894ae4a7448b4be21376
SHA512
386e6624563f23450d6789bbcd774313eda458fecce0618fdacd947e0acdf101f38217e95bab80129df89e1b13912ca9e849267651302a61f19e275190fd9d22
SSDEEP
96:TDbxJhNipnTxOnMvykLe5TVeX0fEuIrc1Eoe/uhLEJEaflxqeNHb:TnhNip0nMoqQr82mLzqeNH
Checks for missing Authenticode signature.
resource |
---|
5faf3743b56e6cca97b46d790b4b246c_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
WideCharToMultiByte
IsBadReadPtr
GetPrivateProfileStringA
Sleep
CreateThread
WriteProcessMemory
GlobalFree
GlobalLock
GlobalAlloc
GetModuleFileNameA
GetCurrentProcess
ReadProcessMemory
UnhookWindowsHookEx
CallNextHookEx
SetWindowsHookExA
InternetReadFile
InternetOpenUrlA
InternetOpenA
InternetCloseHandle
_adjust_fdiv
malloc
_stricmp
_initterm
free
fopen
??3@YAXPAX@Z
strrchr
strcpy
sprintf
??2@YAPAXI@Z
strlen
memcpy
memset
fclose
fprintf
fa
fc
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ