getVer
hideProcess
showProcess
Static task
static1
Behavioral task
behavioral1
Sample
6a58a3965d3e19c971a51ec725ef2a58_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
6a58a3965d3e19c971a51ec725ef2a58_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
6a58a3965d3e19c971a51ec725ef2a58_JaffaCakes118
Size
44KB
MD5
6a58a3965d3e19c971a51ec725ef2a58
SHA1
793ed9b86d2a14c4a59f69c3210ed95f83ee514d
SHA256
a3d121316fed87c1b94d6ee135896de79f0004f35d139770f6edb948458598ea
SHA512
0057039deadd512b9bdc900bb7ac647064606a5ee6674efc369c215e50b425cf26296327f3dafc8ca410dbb338eb3cb7c3e045280c84793d4368c30ec423a9e2
SSDEEP
768:Qo9vEbcc/O7NwiUvHgT81yMwpQJC7RegQYots9:PEbccGIgT8oBQg93o
Checks for missing Authenticode signature.
resource |
---|
6a58a3965d3e19c971a51ec725ef2a58_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
SetThreadPriority
GetCurrentThread
GetModuleHandleA
GetSystemInfo
GetProcAddress
CloseHandle
Module32Next
Module32First
CreateToolhelp32Snapshot
GetCurrentProcessId
VirtualQuery
WriteProcessMemory
GetCurrentProcess
lstrcpynA
lstrcmpiA
LoadLibraryA
LoadLibraryW
LoadLibraryExA
LoadLibraryExW
lstrlenA
GetModuleFileNameA
GetSystemDirectoryA
VirtualProtect
DisableThreadLibraryCalls
RtlUnwind
GetCommandLineA
GetVersion
HeapFree
HeapAlloc
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
GetLastError
ExitProcess
TerminateProcess
HeapReAlloc
HeapSize
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
WriteFile
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
VirtualAlloc
IsBadWritePtr
SetUnhandledExceptionFilter
IsBadReadPtr
IsBadCodePtr
GetCPInfo
GetACP
GetOEMCP
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
UnhookWindowsHookEx
SetWindowsHookExA
CallNextHookEx
ImageDirectoryEntryToData
getVer
hideProcess
showProcess
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ