erc
fdsew
Static task
static1
Behavioral task
behavioral1
Sample
688932ac2f3ff43a03ec73d14335fb31_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
688932ac2f3ff43a03ec73d14335fb31_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
688932ac2f3ff43a03ec73d14335fb31_JaffaCakes118
Size
40KB
MD5
688932ac2f3ff43a03ec73d14335fb31
SHA1
901a811def60a2d6f0c0b100c6795a9f54e8e305
SHA256
94333aa893ce49b10288d45caf006f6b7120b2eb299f441fe30b453e104e685e
SHA512
28c9e3e4fc42e0b16dd4be761190670086b412416882ff19a30202f248c8f1d446629880057fa37dfe20db226fe214df743477e9925b0e5d01830e74ca962922
SSDEEP
768:wECw6P7MvZkGLteDsYD4zxiEyYLWurRU5QamyG:wEZ6P7MvZPm4n0qamyG
Checks for missing Authenticode signature.
resource |
---|
688932ac2f3ff43a03ec73d14335fb31_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetLastError
CreateMutexA
GetCurrentProcessId
CloseHandle
ReadFile
CreateFileA
GetModuleFileNameA
WriteFile
DeleteFileA
InitializeCriticalSection
VirtualProtectEx
VirtualProtect
GetPrivateProfileStringA
WideCharToMultiByte
LeaveCriticalSection
EnterCriticalSection
ReadProcessMemory
SetUnhandledExceptionFilter
ExitProcess
OpenThread
MultiByteToWideChar
VirtualAlloc
VirtualFreeEx
lstrlenA
VirtualAllocEx
GetCurrentProcess
GetCurrentThreadId
Sleep
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
GetCommandLineA
IsBadReadPtr
TerminateThread
CreateThread
GetModuleHandleA
LoadLibraryA
SetThreadContext
GetProcAddress
IsWindowVisible
FindWindowExA
GetWindowThreadProcessId
CallNextHookEx
GetWindowTextA
SendMessageA
RegCloseKey
RegOpenKeyExA
RegSetValueExA
??3@YAXPAX@Z
strncpy
strchr
__CxxFrameHandler
_strupr
_stricmp
_strlwr
_strcmpi
strstr
??2@YAPAXI@Z
memcpy
strrchr
memset
sprintf
strcat
strcpy
strcmp
wcslen
strlen
erc
fdsew
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ