ooo
ppp
Static task
static1
Behavioral task
behavioral1
Sample
84bb56a0d0893955e078840d1440b939_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
84bb56a0d0893955e078840d1440b939_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
84bb56a0d0893955e078840d1440b939_JaffaCakes118
Size
40KB
MD5
84bb56a0d0893955e078840d1440b939
SHA1
d4ca010cb18f26ba18e64e4f4582a79f9c9bbae3
SHA256
f181041b7db2042c8bef4e087bc6dfaa3fdc2dbb07d91f90a66d1b8008d5f8aa
SHA512
fcf36d02760e72564bf0c5376ab13a973613d58f35ff23a11f4a680a7f5bed2afcd0d855f822a8b95d8beb4a3fb11792d82f8391f9a8db7d2a9da3babbd75dc5
SSDEEP
384:x7UWnJ2jFCTZtXiKz/DlpbDM+H0m/VCcYJ9L90HT83zsnaHyg6XXHmA1OY:BzAjQXLz/DlpbDvxNaJ9L/QnaSguTOY
Checks for missing Authenticode signature.
resource |
---|
84bb56a0d0893955e078840d1440b939_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
CreateMutexA
GetCurrentProcessId
DeleteFileA
CloseHandle
ReadFile
CreateFileA
GetTempPathA
VirtualAlloc
RaiseException
GetLocalTime
GetPrivateProfileStringA
VirtualProtect
WriteFile
TerminateProcess
GetCurrentProcess
GetModuleFileNameA
GetTickCount
ExitProcess
GetLastError
WideCharToMultiByte
ReadProcessMemory
SetUnhandledExceptionFilter
SetThreadContext
OpenThread
MultiByteToWideChar
GetCurrentThreadId
Sleep
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
GetCommandLineA
IsBadReadPtr
TerminateThread
CreateThread
GetModuleHandleA
LoadLibraryA
VirtualProtectEx
GetProcAddress
CallNextHookEx
GetWindowThreadProcessId
GetClassNameA
GetWindowTextA
RegOpenKeyExA
RegCloseKey
_strcmpi
_stricmp
_strlwr
_strupr
__CxxFrameHandler
??2@YAPAXI@Z
memcpy
strrchr
memset
sprintf
strcat
strcpy
strlen
rand
srand
strcmp
strstr
??3@YAXPAX@Z
strncpy
strchr
ooo
ppp
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ