_ClearFlag@0
_Start@12
_Stop@0
Static task
static1
Behavioral task
behavioral1
Sample
874a4d8cb70a19faf0873b9b3bae55a4_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
874a4d8cb70a19faf0873b9b3bae55a4_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
874a4d8cb70a19faf0873b9b3bae55a4_JaffaCakes118
Size
46KB
MD5
874a4d8cb70a19faf0873b9b3bae55a4
SHA1
1f468f4b6d15cb03878c73be0a1e73c7083bf408
SHA256
93480d9704751ac99241c4c996defc0853c1eda0450d0b914835e52891a7e49d
SHA512
cd49c14b3e3e0821c0b38318b956e07094d3852f235f799e6040822fe3aa22b0b1f494d741777c3fe87b2e19722da361f8f664489c25e7262330cbc90cad8052
SSDEEP
768:mSGpP5AHWuvpTY/tHwU9ti5jEAIHS7HOQTivUwldj1OnOq4AeKrvLuGq88O3L2NN:lGp/XHdtGQCpTAUUdjm+AeKrXKOLNo
Checks for missing Authenticode signature.
resource |
---|
874a4d8cb70a19faf0873b9b3bae55a4_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
MapViewOfFile
CreateFileMappingA
UnmapViewOfFile
CloseHandle
WriteProcessMemory
OpenProcess
GetCurrentProcessId
GetTickCount
WideCharToMultiByte
MultiByteToWideChar
ReadProcessMemory
lstrcmpiA
lstrcpyA
lstrcpynA
lstrlenA
FlushViewOfFile
OpenFileMappingA
FlushFileBuffers
GetStringTypeW
GetCommandLineA
GetVersion
HeapFree
HeapAlloc
ExitProcess
TerminateProcess
GetCurrentProcess
HeapReAlloc
HeapSize
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
GetLastError
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
GetModuleHandleA
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
WriteFile
VirtualAlloc
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
RtlUnwind
SetFilePointer
InterlockedDecrement
InterlockedIncrement
GetCPInfo
GetACP
GetOEMCP
GetProcAddress
LoadLibraryA
SetStdHandle
LCMapStringA
LCMapStringW
GetStringTypeA
SetWindowsHookExA
CallNextHookEx
PostMessageA
FindWindowExA
GetWindow
GetDlgCtrlID
SendMessageA
UnhookWindowsHookEx
htonl
_ClearFlag@0
_Start@12
_Stop@0
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ