FzfwdzaNus
SwFcomllnJrjlOw
Jcbxnyi
EbkcfeeUplrfFubqVx
Static task
static1
Behavioral task
behavioral1
Sample
60b444dfa546a2a7c38127a82f84d392_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
60b444dfa546a2a7c38127a82f84d392_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
60b444dfa546a2a7c38127a82f84d392_JaffaCakes118
Size
80KB
MD5
60b444dfa546a2a7c38127a82f84d392
SHA1
39dd5f21931116d2b8cc4d0858baa75cdf761f74
SHA256
903cf545efb48262d9c0a38e87c1034e1ec7ef481f425d5a46d03726df4178b1
SHA512
10e508337f281a05939a1f60af891c5f25030a5c42fc586bc47f0107456d81e41c84fba58b775196b9e5e9f241d449c38341e9da8ba9a65f2dbb75c5970e7735
SSDEEP
1536:swF5HM7UgHi8KpTP+1P++xLF0nvwBWi7VrAabNX/KvpWDA9r5FjDf2+WWVRgGTEb:boi9pePnxL2v1OOaN/w8AxLDgB
Checks for missing Authenticode signature.
resource |
---|
60b444dfa546a2a7c38127a82f84d392_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
MapViewOfFileEx
CreateHardLinkW
FindAtomA
FlushFileBuffers
LoadLibraryA
IsDBCSLeadByte
SetProcessWorkingSetSize
SetFileTime
FlushViewOfFile
GetLastError
GetProcAddress
GetModuleHandleA
GetModuleHandleW
ExitThread
MoveFileWithProgressA
VirtualAlloc
ExitProcess
VirtualProtect
TerminateJobObject
CreatePipe
acos
_mbsncoll
_pipe
memset
ispunct
memcpy
_osplatform
realloc
is_wctype
DialogBoxParamW
PrivateExtractIconsA
DrawTextW
LoadStringA
ShowWindow
GetProcessDefaultLayout
SetFocus
ModifyMenuW
DefWindowProcW
GetClientRect
SetWindowLongW
GetWindowLongW
SetDlgItemTextW
GetMenu
GetWindowTextLengthW
EqualRect
AppendMenuW
SetCursor
TrackPopupMenu
RealChildWindowFromPoint
CreateFontIndirectW
CreateDIBSection
DeleteObject
GetCurrentObject
SetPaletteEntries
GetBrushOrgEx
CreateSolidBrush
SetRectRgn
GetStockObject
CombineRgn
GetTextFaceW
glNormal3sv
glInitNames
glTexEnviv
wglGetCurrentDC
glEnableClientState
glTexCoord1i
glNormal3d
glDrawBuffer
glNormal3dv
glColor4fv
glTranslatef
glGetTexLevelParameteriv
glTexCoord1d
FzfwdzaNus
SwFcomllnJrjlOw
Jcbxnyi
EbkcfeeUplrfFubqVx
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ