SelfEject
SelfInject
Static task
static1
Behavioral task
behavioral1
Sample
635afaadf4297dab1da5e652a440ad5b_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
635afaadf4297dab1da5e652a440ad5b_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
635afaadf4297dab1da5e652a440ad5b_JaffaCakes118
Size
32KB
MD5
635afaadf4297dab1da5e652a440ad5b
SHA1
678ff662e24b51f1e1b163a349e2f680c283cce9
SHA256
3c103419154a3116f2803ebb972e93e4cb13f3386ef41aa1b52a9441dd2040a7
SHA512
3557c87c0c5abc746d1ec6d93c3093b6da25940b046ee1c5d14ebad1d22ccf857e753dc785eaeea56748b5608d49885288fb62808df0fbedfe04b1a4bd9b809a
SSDEEP
384:ttwagcHdNT+FIIE+77E69rml0GD9yB5qN/16ktFXyl1:ttwaJdNT+FXp7bMpfNYktFXu
Checks for missing Authenticode signature.
resource |
---|
635afaadf4297dab1da5e652a440ad5b_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetProcAddress
GetModuleHandleA
lstrcmpW
VirtualProtect
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
GetCurrentProcessId
GetCommandLineA
GetVersion
ExitProcess
TerminateProcess
GetCurrentProcess
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
TlsGetValue
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
HeapFree
WriteFile
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
HeapAlloc
GetCPInfo
GetACP
GetOEMCP
VirtualAlloc
HeapReAlloc
LoadLibraryA
MultiByteToWideChar
RtlUnwind
UnhookWindowsHookEx
SetWindowsHookExA
CallNextHookEx
RegEnumValueW
SelfEject
SelfInject
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ