ENProcess
HDDGuard
Static task
static1
Behavioral task
behavioral1
Sample
87ba08c38b757ae707200cc13cd893bf_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
87ba08c38b757ae707200cc13cd893bf_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
87ba08c38b757ae707200cc13cd893bf_JaffaCakes118
Size
5KB
MD5
87ba08c38b757ae707200cc13cd893bf
SHA1
865e3d2bbaa53a77cb980e61fdad4f9220a82880
SHA256
8424f8ed0e85e903d77f577b953a0fd7a353ff858bf742fd30daf5327a92ad2a
SHA512
11edca02cb0b13675598b1933cfc5d5295fea231d53e990752c826c2bd389a781468ccb53620b48b17996d620600729e19108b46e7deb5e8c62a295cd5b3b060
SSDEEP
96:KYYGD6s3STc4LDoiS+VH4pbqzPXQoVYVk5RPh6c9xUBNVry:LD6T3/3sCYVkzP5923G
Checks for missing Authenticode signature.
resource |
---|
87ba08c38b757ae707200cc13cd893bf_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
CreateThread
GetCommandLineA
GetModuleFileNameA
GetPrivateProfileStringA
lstrlenA
WinExec
lstrcmpA
DeleteFileA
GlobalAlloc
Sleep
lstrcatA
lstrcpyA
GetSystemDirectoryA
GetModuleHandleA
CallNextHookEx
SetWindowsHookExA
CharUpperA
CharLowerA
wsprintfA
URLDownloadToFileA
DeleteUrlCacheEntry
ENProcess
HDDGuard
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ