?catch4@@YAXKK@Z
DllMain
catchxx1
catchxx2
Static task
static1
Behavioral task
behavioral1
Sample
74af4fbc9292c476b031a6149b318010_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
74af4fbc9292c476b031a6149b318010_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
74af4fbc9292c476b031a6149b318010_JaffaCakes118
Size
21KB
MD5
74af4fbc9292c476b031a6149b318010
SHA1
fc221fed6da6d26a802cd7b947fbda06df56145e
SHA256
046ee97f4f6654573654814a46f547f2399cbeeb239663483599ec3c56874794
SHA512
8f4b12b71e1c2c8d5870c25854d1ae42285f849e0966af5cd3070397099e307f858771bf76a38f8b9b61f7c642de6909b37031adb3b228b14e55337f8712ebfc
SSDEEP
384:AhbTpi99JwCfY8VytqqVRkSF9bxy8S3ZSZK78oy:2XcU8SfRjF9VTgZSZK78oy
Checks for missing Authenticode signature.
resource |
---|
74af4fbc9292c476b031a6149b318010_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
FreeLibrary
LoadLibraryA
Sleep
WritePrivateProfileStringA
GetPrivateProfileStringA
GetVersionExA
WideCharToMultiByte
GetTempPathA
CloseHandle
CreateThread
IsBadReadPtr
GetCurrentProcessId
CreateSemaphoreA
GetModuleFileNameA
lstrlenA
HeapFree
GetProcessHeap
VirtualAlloc
VirtualProtect
GetModuleHandleA
GetProcAddress
HeapAlloc
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
MultiByteToWideChar
RtlUnwind
wsprintfA
CharLowerBuffA
InternetOpenA
InternetConnectA
HttpOpenRequestA
HttpSendRequestA
InternetCloseHandle
HttpSendRequestW
?catch4@@YAXKK@Z
DllMain
catchxx1
catchxx2
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ