GetDLlVersion
Run
Static task
static1
Behavioral task
behavioral1
Sample
75b1fe9f1e5a968a0e0d584d5c901f71_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
75b1fe9f1e5a968a0e0d584d5c901f71_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
75b1fe9f1e5a968a0e0d584d5c901f71_JaffaCakes118
Size
64KB
MD5
75b1fe9f1e5a968a0e0d584d5c901f71
SHA1
9802b4af6c8058bf7ee81b49e2135c768b899623
SHA256
212770a07309192b8fdfab71202f3aac0b2014ab9e795766a4cb5b218ceb241e
SHA512
7c5ae5f08ac602da6daf598bc4bf93d092eaac0b5148e43dae63a48fa4c02a0a34b8011f09f6d9b1a1df852299b24212280337a8e4c40bc072aa2ebff9b6b4c1
SSDEEP
768:JHLEjXqOcy48wA+LkoqW8lyTxkw9U2p26wbzC5sdxMjiB9UQgwB9HiGOssd:JWaC+Ltq1lyTCM8nzN4gos0
Checks for missing Authenticode signature.
resource |
---|
75b1fe9f1e5a968a0e0d584d5c901f71_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Sleep
CreateProcessA
GetSystemDirectoryA
GetModuleFileNameA
GetPrivateProfileStringA
WritePrivateProfileStringA
TerminateProcess
WaitForSingleObject
GetLastError
OutputDebugStringA
LCMapStringW
LCMapStringA
SetEndOfFile
LoadLibraryA
GetOEMCP
GetACP
GetCPInfo
HeapFree
HeapAlloc
HeapReAlloc
GetFileAttributesA
GetCommandLineA
GetVersion
GetModuleHandleA
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
ExitProcess
RtlUnwind
CloseHandle
WriteFile
ReadFile
GetProcAddress
GetCurrentProcess
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetFilePointer
InterlockedDecrement
InterlockedIncrement
SetStdHandle
FlushFileBuffers
CreateFileA
MultiByteToWideChar
GetStringTypeA
GetStringTypeW
CreateDesktopA
OpenDesktopA
CloseDesktop
closesocket
recv
send
shutdown
socket
setsockopt
connect
WSAStartup
inet_addr
gethostbyname
WSACleanup
htons
GetDLlVersion
Run
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ