DllMain
WLEventStartShell
Static task
static1
Behavioral task
behavioral1
Sample
85e13602da5437b32bc23441fdcdf603_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
85e13602da5437b32bc23441fdcdf603_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
85e13602da5437b32bc23441fdcdf603_JaffaCakes118
Size
21KB
MD5
85e13602da5437b32bc23441fdcdf603
SHA1
b299b969b3756cc7a5e93f00036ec978bcc0f287
SHA256
b559ad809d124e913fe8a1b1e5df0499c2e99f62f3543e2de184280f01e3b023
SHA512
d5c2ccdff590dba2f6cf19888744308ae5085831cdbfbd69d9ccdbb2f6b9bd045dd1c8e6fc1a7e5244006c6ae6c60a3e5e2661d19578d7e0f655ef7a5cef9060
SSDEEP
384:pQb0twQ1Zg9XWB7Ubyija1oq8S48mZhhwwMT2dFzi:6KwQbgJq4WiG1FG02Lzi
Checks for missing Authenticode signature.
resource |
---|
85e13602da5437b32bc23441fdcdf603_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
IMAGE_FILE_DLL
CloseHandle
CreateProcessA
GetEnvironmentVariableA
GetThreadContext
ReadProcessMemory
ResumeThread
SetThreadContext
VirtualAllocEx
WriteProcessMemory
lstrcatA
lstrcpyA
DllMain
WLEventStartShell
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ