fx
kkk
Static task
static1
Behavioral task
behavioral1
Sample
81c97fd9893e0add68fbfd0cee886193_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
81c97fd9893e0add68fbfd0cee886193_JaffaCakes118.dll
Resource
win10v2004-20240730-en
Target
81c97fd9893e0add68fbfd0cee886193_JaffaCakes118
Size
40KB
MD5
81c97fd9893e0add68fbfd0cee886193
SHA1
ed7e455d95d4fabe53e1ebf496b30629b4cefec7
SHA256
b28671fbfa233122dc7da3f86175bab43a59b4fa16ec29f7d6034ba239d9643c
SHA512
ee562634a8ca9736e5b2787786ca31bb43d7d13e08b2d8166eba72c1f8e7aa443ea401d3052434d67fc376e8bc5207ffa8d6fa82fcf7c3034f3c0cc73724638f
SSDEEP
768:Pj4AmivJ8s5D8/FZuMkmi7dC9q4CD3p88fU:PjjWYIgMOdb4U68f
Checks for missing Authenticode signature.
resource |
---|
81c97fd9893e0add68fbfd0cee886193_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
WriteFile
GetCurrentProcessId
CreateFileA
IsBadReadPtr
GetCommandLineA
ReadFile
GetModuleFileNameA
GetLastError
CreateMutexA
ReadProcessMemory
SetUnhandledExceptionFilter
SetThreadContext
OpenThread
WideCharToMultiByte
MultiByteToWideChar
VirtualAlloc
LoadLibraryA
GetCurrentThreadId
GetCurrentProcess
DeleteFileA
CloseHandle
VirtualProtectEx
VirtualProtect
LeaveCriticalSection
EnterCriticalSection
WriteProcessMemory
OpenProcess
GetFileSize
Thread32Next
GetThreadPriority
Thread32First
CreateToolhelp32Snapshot
ExitProcess
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
GetPrivateProfileStringA
TerminateThread
CreateThread
Sleep
GetModuleHandleA
GetProcAddress
InitializeCriticalSection
CallNextHookEx
GetWindowThreadProcessId
GetWindowTextA
strchr
_strcmpi
_strlwr
_stricmp
sprintf
strlen
memcpy
strcpy
??2@YAPAXI@Z
strrchr
memset
strcat
??3@YAXPAX@Z
strncpy
_strupr
strstr
strcmp
__CxxFrameHandler
wcslen
fx
kkk
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ