DllMain
HookWin32Api
catchxx1
catchxx2
Static task
static1
Behavioral task
behavioral1
Sample
696f3b94de9e960d98c36c5147feda63_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
696f3b94de9e960d98c36c5147feda63_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
696f3b94de9e960d98c36c5147feda63_JaffaCakes118
Size
19KB
MD5
696f3b94de9e960d98c36c5147feda63
SHA1
690986100a9b286a2c7325cfe7bdc33399a8da36
SHA256
3858c43671b0a2110b9c7ad6c9e1a88cc633fe3704ad66d7e4e00d58e0f8ab03
SHA512
fb0087dca53254aec294bc25acd7da71af83cd5e9c1fdf2182cede270d3e9cc1293f79d0cfa494be75387b6aabc6307eb4b4164567aabe8c466c2df8f5fa9dc4
SSDEEP
384:z99rpH0+NX/DMvNLzCRSKHy+ucUK78oy:7aVNLzCRbvUK78oy
Checks for missing Authenticode signature.
resource |
---|
696f3b94de9e960d98c36c5147feda63_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
FreeLibrary
LoadLibraryA
Sleep
WritePrivateProfileStringA
GetPrivateProfileStringA
GetVersionExA
WideCharToMultiByte
GetTempPathA
CreateThread
IsBadReadPtr
GetCurrentProcessId
CreateSemaphoreA
GetModuleFileNameA
GetStringTypeW
GetStringTypeA
LCMapStringW
GetProcAddress
VirtualAlloc
VirtualProtect
GetModuleHandleA
CloseHandle
LCMapStringA
MultiByteToWideChar
RtlUnwind
lstrlenA
HeapFree
GetProcessHeap
HeapAlloc
CharLowerBuffA
wsprintfA
InternetCloseHandle
InternetConnectA
InternetOpenA
HttpSendRequestW
HttpSendRequestA
HttpOpenRequestA
DllMain
HookWin32Api
catchxx1
catchxx2
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ