fff
ggg
Static task
static1
Behavioral task
behavioral1
Sample
6099878d84da84d475a33110951e2fcb_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
6099878d84da84d475a33110951e2fcb_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
6099878d84da84d475a33110951e2fcb_JaffaCakes118
Size
40KB
MD5
6099878d84da84d475a33110951e2fcb
SHA1
c266727e32c09334e7ae3013f89a1208e6eb6c9f
SHA256
b5b84cccc48944711970cd9f671c7b307b4ab1090b047aad5cc4179411902796
SHA512
6164b18c1fee2a0cee33188f1d23994bfa4aebc54fa1bc7e57afe0798d5067240e96da367f34c9ca71f88ed684a67d8881f9ecd3b3cab6ec65888a95a1f56fda
SSDEEP
384:a2DzQO+ZbJT4DMMrdaGXmNl/4LJR0pAjvF03mU9nQdtCM6WA4MRDM9Ne:XDkO+ZWDML/uzx2F4tCMZAXRD8
Checks for missing Authenticode signature.
resource |
---|
6099878d84da84d475a33110951e2fcb_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetLastError
CreateMutexA
GetCurrentProcessId
GetPrivateProfileStringA
GetModuleHandleA
ReadProcessMemory
SetUnhandledExceptionFilter
SetThreadContext
OpenThread
GetProcAddress
DeleteFileA
GetTempPathA
VirtualAlloc
LoadLibraryA
WriteFile
WideCharToMultiByte
MultiByteToWideChar
TerminateProcess
CreateProcessA
GetModuleFileNameA
GetSystemDirectoryA
GetCurrentThreadId
GetCurrentProcess
VirtualProtectEx
CreateFileA
SetFilePointer
ReadFile
CloseHandle
Sleep
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
GetCommandLineA
IsBadReadPtr
TerminateThread
CreateThread
ExitProcess
lstrcatA
CallNextHookEx
GetWindowThreadProcessId
GetWindowTextA
SetWindowsHookExA
UnhookWindowsHookEx
GetForegroundWindow
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
PathFileExistsA
_initterm
malloc
_adjust_fdiv
_stricmp
_strlwr
_strcmpi
free
strcmp
fopen
sprintf
??2@YAPAXI@Z
memcpy
strrchr
memset
strcat
strcpy
strlen
atoi
strstr
??3@YAXPAX@Z
strncpy
strchr
fclose
fread
fff
ggg
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ