a
b
c
Static task
static1
Behavioral task
behavioral1
Sample
7474919aff407e06d9eec5794ebf6b83_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
7474919aff407e06d9eec5794ebf6b83_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
7474919aff407e06d9eec5794ebf6b83_JaffaCakes118
Size
21KB
MD5
7474919aff407e06d9eec5794ebf6b83
SHA1
9a7ee0e33057541454cd8bcd516f8a2d744b3f46
SHA256
38c8fec022997ae162b9d46a906c5b26de010a01552ec71f00561ab0305f9bcb
SHA512
2ec314d5c584aeb0062aac431cd89ef5f9e785c5d2e3d465ea5416927d917b7d2b12e27981c710f0f351f4be99f99a8cb6ea10a72bd078fceca5f981ee7050f1
SSDEEP
384:/7GeCgFGH29nTUddzYRx2ixKg37ZNdh0ZxhlxKLsUWoLRwu1QLz6JBvGj1:/BzKAxoZtE5Rwu1Kz6JBU
Checks for missing Authenticode signature.
resource |
---|
7474919aff407e06d9eec5794ebf6b83_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetTempFileNameA
GetTempPathA
GetProcAddress
GetModuleHandleA
MulDiv
GetTickCount
CloseHandle
WriteFile
ReadFile
CreateFileA
WaitForMultipleObjects
WaitForSingleObject
DeleteFileA
CreateEventA
SetFilePointer
HeapReAlloc
InterlockedExchange
RtlUnwind
HeapFree
lstrlenA
CreateProcessA
ExitThread
CreateThread
GetLastError
SetEvent
GetProcessHeap
HeapAlloc
GlobalAlloc
lstrcpynA
VirtualQuery
lstrcpyA
GetModuleFileNameA
GlobalFree
RegisterWindowMessageA
SetWindowLongA
SetDlgItemTextA
MessageBoxA
CallWindowProcA
DestroyWindow
EnableWindow
CharLowerBuffA
PeekMessageA
TranslateMessage
DispatchMessageA
MsgWaitForMultipleObjects
wsprintfA
SetWindowTextA
SendMessageA
GetDlgItem
GetFocus
IsWindowVisible
ShowWindow
GetClientRect
GetWindowRect
CreateWindowExA
GetWindowLongA
CloseWindow
RegDeleteKeyA
RegCloseKey
RegQueryValueExA
RegOpenKeyA
RegOpenKeyExA
RegEnumValueA
RegCreateKeyA
InternetConnectA
InternetOpenA
InternetCloseHandle
InternetReadFile
InternetSetFilePointer
InternetCrackUrlA
FindCloseUrlCache
FindFirstUrlCacheEntryA
HttpOpenRequestA
HttpSendRequestA
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
a
b
c
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ