fa
fc
Static task
static1
Behavioral task
behavioral1
Sample
7222b97949540fe0389be51372f3d86e_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
7222b97949540fe0389be51372f3d86e_JaffaCakes118.dll
Resource
win10v2004-20240704-en
Target
7222b97949540fe0389be51372f3d86e_JaffaCakes118
Size
7KB
MD5
7222b97949540fe0389be51372f3d86e
SHA1
24b704f783421bc0999b4b78b98cf4ec2d1bdb05
SHA256
b2f447fd255bce5e26611e5acb66220609d4c601058e7010a4301250fa27dba5
SHA512
428b51863790f4e83f5b9072e6f385c477b8c38241fcff826605593eaf1bfcaa1c8118f5116f0a6e66428a33f6b4bf576c69f8af8a098c2288512f07235e3cd5
SSDEEP
96:V/8lbcjlSpiypRgHMz6C4dS2li+yLVJOJmqk9auL6:ecUpiQMPiDVgJmqJue
Checks for missing Authenticode signature.
resource |
---|
7222b97949540fe0389be51372f3d86e_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetModuleFileNameA
GetComputerNameA
WriteProcessMemory
ReadProcessMemory
GetCurrentProcessId
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
CreateThread
Sleep
GetCurrentProcess
ExitProcess
GetWindowThreadProcessId
GetWindowTextA
SetWindowsHookExA
UnhookWindowsHookEx
CallNextHookEx
FindWindowA
InternetOpenUrlA
InternetOpenA
InternetCloseHandle
sprintf
_adjust_fdiv
malloc
_initterm
free
memcpy
strchr
strncpy
strrchr
??3@YAXPAX@Z
memset
??2@YAPAXI@Z
_stricmp
strcmp
strcat
strcpy
strlen
fa
fc
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ