hhh
iii
Static task
static1
Behavioral task
behavioral1
Sample
824ac6e386c8a8e63823068d01e6f263_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
824ac6e386c8a8e63823068d01e6f263_JaffaCakes118.dll
Resource
win10v2004-20240730-en
Target
824ac6e386c8a8e63823068d01e6f263_JaffaCakes118
Size
26KB
MD5
824ac6e386c8a8e63823068d01e6f263
SHA1
55b33f44eb6f3751bebcff67ff857116868aec32
SHA256
7770e56e3d1c1f0846c6ffb059b173dd9a49c332690605bcaec26556efc8cf88
SHA512
62ceeb3087454677ccd4311fe0a261b7fae79360fe4bcd6120547afdb4b4ded798c5d862651cde704ce1ed957db6ea9255c0553220b9b44597b1572762306c2a
SSDEEP
384:bDX8GqEDgwY/CNnnyyeBAwpn3Zw2hwuXEPgHlhN71GJ7QK6W0boJM8AAmv:nX8iDE/YyHPyBuThNRmdZ8olVq
Checks for missing Authenticode signature.
resource |
---|
824ac6e386c8a8e63823068d01e6f263_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetModuleFileNameA
GetLastError
CreateMutexA
GetCurrentProcessId
GetPrivateProfileStringA
GetModuleHandleA
ReadProcessMemory
SetUnhandledExceptionFilter
SetThreadContext
OpenThread
GetProcAddress
WideCharToMultiByte
MultiByteToWideChar
TerminateProcess
CreateProcessA
VirtualAlloc
LoadLibraryA
ExitProcess
GetSystemDirectoryA
CreateFileA
GetCurrentProcess
WriteFile
DeleteFileA
InitializeCriticalSection
VirtualProtectEx
VirtualProtect
LeaveCriticalSection
EnterCriticalSection
SetFilePointer
ReadFile
CloseHandle
Sleep
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
GetCommandLineA
IsBadReadPtr
TerminateThread
CreateThread
GetCurrentThreadId
CallNextHookEx
GetWindowThreadProcessId
FindWindowA
GetWindowTextA
SetWindowsHookExA
_stricmp
_strlwr
_strupr
_strcmpi
_strnicmp
sprintf
??2@YAPAXI@Z
memcpy
strrchr
memset
strcat
strcpy
strlen
??3@YAXPAX@Z
strncpy
strchr
strstr
fclose
fread
fopen
strcmp
__CxxFrameHandler
wcslen
hhh
iii
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ