kkk
lll
Static task
static1
Behavioral task
behavioral1
Sample
633c8023af44ec4931fceec2153c9733_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
633c8023af44ec4931fceec2153c9733_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
633c8023af44ec4931fceec2153c9733_JaffaCakes118
Size
28KB
MD5
633c8023af44ec4931fceec2153c9733
SHA1
1703f32280c7d354194493d4848af3ce7b430d44
SHA256
9d9f413785f6be15acc884bd430b5763384ced8f5c9d7c3845aaeb6bd3de7a6a
SHA512
da43e895149babd08ac678189492094337c49c34308412a07abe9fad07c785636b3292abf1393f17d8be9e8c63dc1fa104391b87bd565d76fa2a109bf002d2ac
SSDEEP
768:xaYeUqx+oEp8mPSczWw8FNUDodmrTHn65TMZ:Xen+oEp8mPSleokoQ
Checks for missing Authenticode signature.
resource |
---|
633c8023af44ec4931fceec2153c9733_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetLastError
CreateMutexA
GetCurrentProcessId
CreateThread
GetProcAddress
VirtualAlloc
ReadProcessMemory
GlobalLock
GlobalAlloc
CreateProcessA
GetModuleFileNameA
GetPrivateProfileStringA
WideCharToMultiByte
MultiByteToWideChar
GlobalFree
GlobalUnlock
IsBadReadPtr
SetFilePointer
ExitProcess
VirtualProtectEx
LeaveCriticalSection
EnterCriticalSection
LoadLibraryA
SetThreadContext
OpenThread
SetUnhandledExceptionFilter
GetCommandLineA
GetCurrentThreadId
WriteProcessMemory
ReadFile
DeleteFileA
GetTempPathA
CreateFileA
WriteFile
CloseHandle
VirtualProtect
GetModuleHandleA
GetCurrentProcess
TerminateProcess
TerminateThread
InitializeCriticalSection
Sleep
GetWindowThreadProcessId
FindWindowA
CallNextHookEx
UnhookWindowsHookEx
SetWindowsHookExA
GetForegroundWindow
GetWindowTextA
InternetCloseHandle
InternetReadFile
wcslen
strrchr
_strupr
_stricmp
_strcmpi
_strlwr
strcmp
fopen
fread
fclose
strcpy
sprintf
strlen
memcpy
strcat
memset
??2@YAPAXI@Z
atoi
??3@YAXPAX@Z
strstr
strncpy
strchr
kkk
lll
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ