FfdYpvvdxuJgkqeuxJfqxQx
DrrOzvb
StquAiehPztqgumUg
Static task
static1
Behavioral task
behavioral1
Sample
683af24275cd7c695d79692db2e1571d_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
683af24275cd7c695d79692db2e1571d_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
683af24275cd7c695d79692db2e1571d_JaffaCakes118
Size
141KB
MD5
683af24275cd7c695d79692db2e1571d
SHA1
e47d748c027b6468665027d43a3411651e0154cd
SHA256
79fc007de7d7d3ff4ff104f5ac52218dca4b706895913c82c6b3bbd83bd76559
SHA512
a99669fe7d7c32b4bf62793523cbb5098dfc9b898204c1d06ac44b13c96460c152a68e3595075ebe6ba659aec9fcce972897547ffdf22a398546abcb2e638219
SSDEEP
3072:bTFvPHfWK2L+Alr5L9LZmEfABJgO8Fd8yYQ7l//Oj9:bTFH/6HNL9LZmE4TgOMdnYo/C
Checks for missing Authenticode signature.
resource |
---|
683af24275cd7c695d79692db2e1571d_JaffaCakes118 |
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetProcAddress
VirtualProtect
SetFilePointer
GetModuleHandleA
ExitProcess
GetStringTypeA
SetFileTime
TlsGetValue
VirtualFree
FormatMessageA
SetCurrentDirectoryW
GetSystemWindowsDirectoryW
SetConsoleMode
TlsAlloc
WritePrivateProfileStringA
ReadFile
GetExitCodeProcess
LoadLibraryW
LockResource
WritePrivateProfileStringW
GetNumberFormatW
TerminateProcess
LeaveCriticalSection
ResetEvent
OutputDebugStringA
CreateMutexA
SetCurrentDirectoryA
VirtualAlloc
__winitenv
memset
__set_app_type
labs
LoadCursorW
IsWindow
wsprintfA
GetForegroundWindow
CallWindowProcW
DispatchMessageW
CopyRect
DrawEdge
GetClipboardData
CreateWindowExA
CreateCompatibleBitmap
SelectPalette
CreateBitmap
CreateRoundRectRgn
TextOutW
BitBlt
SetStretchBltMode
SetTextColor
SetBkMode
GetStockObject
ExtTextOutW
GetTextMetricsW
GetRegionData
DeleteObject
StretchBlt
GetTextExtentPoint32W
CreateSolidBrush
DeleteDC
LineTo
lineGetAddressCaps
lineAgentSpecific
tapiGetLocationInfoW
lineMakeCallW
lineGetCallInfoA
FfdYpvvdxuJgkqeuxJfqxQx
DrrOzvb
StquAiehPztqgumUg
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ