F11
F2
F22
F3
F33
F4
F5
F66
F77
Static task
static1
Behavioral task
behavioral1
Sample
87a44a0ccc77fc9c032bcf14e0a0e6f0_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
87a44a0ccc77fc9c032bcf14e0a0e6f0_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
87a44a0ccc77fc9c032bcf14e0a0e6f0_JaffaCakes118
Size
64KB
MD5
87a44a0ccc77fc9c032bcf14e0a0e6f0
SHA1
0c2dcb2d4edd9851babf1a6128318c8f182185f0
SHA256
7971fa24831cffcc99cb865d70a7456d62f110af6697b3e8037e47ed9c668624
SHA512
68ef84c116a90cbe9c8e86fef49ad44f237bc6322b32d0c8ac14a1bae233ef32cb6aff79a0299d17493a1c007ac72456e216b69b486bade87f2638ced44d14a7
SSDEEP
768:UShycqxNSCseGw3x1nEvB6lWvG4E4WzmfkU0rkNQUtGmGbZ:UwycKaeRxyB6lYG4Epz4OwNFtGmU
Checks for missing Authenticode signature.
resource |
---|
87a44a0ccc77fc9c032bcf14e0a0e6f0_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetSecurityDescriptorSacl
lstrcatA
GetCurrentProcessId
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GetModuleHandleW
LocalFree
lstrcpyA
LocalAlloc
lstrcmpiA
lstrcpynA
GetCommandLineA
lstrlenA
GetSystemDirectoryA
MapViewOfFile
GetLastError
CreateFileMappingA
SetLastError
LoadLibraryA
CloseHandle
UnmapViewOfFile
MultiByteToWideChar
WideCharToMultiByte
GetVersionExA
LCMapStringW
LCMapStringA
GetStringTypeW
GetStringTypeA
GetLocaleInfoA
GetCurrentThreadId
HeapFree
HeapAlloc
GetProcessHeap
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RtlUnwind
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
InterlockedDecrement
Sleep
HeapSize
ExitProcess
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
LeaveCriticalSection
EnterCriticalSection
VirtualAlloc
HeapReAlloc
GetCPInfo
GetACP
GetOEMCP
WriteFile
InitializeCriticalSection
MessageBoxW
SetWindowsHookExA
UnhookWindowsHookEx
SendMessageA
RegisterWindowMessageA
IsWindowVisible
GetWindowLongA
GetParent
CallNextHookEx
PostMessageA
F11
F2
F22
F3
F33
F4
F5
F66
F77
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ