ppp
qqq
Static task
static1
Behavioral task
behavioral1
Sample
617dd207c05c5deaebd928d9195188be_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
617dd207c05c5deaebd928d9195188be_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
617dd207c05c5deaebd928d9195188be_JaffaCakes118
Size
24KB
MD5
617dd207c05c5deaebd928d9195188be
SHA1
4335a167571744cbdf8153d5d11ad37417da68e1
SHA256
55beee273c512bdfd0962e030d4956134ae1291ab15bd3e2972753c10ddbf220
SHA512
d661135cc8f002510ec6128cf7c7b62734f36aba14e079242fd91e18564fe83f58eca1250b50e916f82146bf0fe15aa616f6e411579f288c60b072505a5181df
SSDEEP
384:CAWXW3x6QVDEEmWc70pSE47dqK1GqNtrK6TDh2AXPm+0W3fGwtG3:0m0B9wpSE47dR1htrK6TDh1++P3uwtG
Checks for missing Authenticode signature.
resource |
---|
617dd207c05c5deaebd928d9195188be_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetTickCount
WideCharToMultiByte
MultiByteToWideChar
TerminateProcess
ReadProcessMemory
CreateProcessA
GetModuleFileNameA
VirtualAlloc
GetProcAddress
LoadLibraryA
ExitProcess
CloseHandle
CreateFileA
GetSystemDirectoryA
GetCurrentThreadId
GetCurrentProcess
ReadFile
SetFilePointer
GetCurrentProcessId
VirtualProtectEx
SetUnhandledExceptionFilter
SetThreadContext
OpenThread
WriteProcessMemory
CreateMutexA
GetLastError
GetModuleHandleA
GetPrivateProfileStringA
Sleep
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
GetCommandLineA
IsBadReadPtr
TerminateThread
CreateThread
UnhookWindowsHookEx
GetWindowTextA
CallNextHookEx
SetWindowsHookExA
GetWindowThreadProcessId
GetForegroundWindow
InternetCloseHandle
InternetReadFile
_initterm
malloc
_adjust_fdiv
_stricmp
_strlwr
_strcmpi
free
strcmp
strcat
sprintf
??2@YAPAXI@Z
memcpy
strrchr
memset
strlen
strcpy
rand
srand
??3@YAXPAX@Z
strncpy
strchr
strstr
fclose
fread
fopen
ppp
qqq
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ