GetMsg
InjectDll
UnmapDll
Static task
static1
Behavioral task
behavioral1
Sample
88a672b8b5a6b0688df10564897d3212_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
88a672b8b5a6b0688df10564897d3212_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
88a672b8b5a6b0688df10564897d3212_JaffaCakes118
Size
53KB
MD5
88a672b8b5a6b0688df10564897d3212
SHA1
50c2944d20818f9b1525331c0c9ce4b974386433
SHA256
491f5048b098c9855091560455d6df8652ba2f848dbffa4363390ba167db8108
SHA512
7fd00ecf66c428cf2b8a596225e39aeb3f5f89ea5d37625105140c639c8ec7f480c8bb801f59f6ff4ec89064f3bfb596971ee2b46f0c2fb84752449597eb2637
SSDEEP
768:46pTsi8w6sqo9JQkiY/r8ZpFTL++zhXhW5vsdgrHfvFzntu1Pzgj5H:RuN+qo9JcpL+KXhWLfvF2PK5H
Checks for missing Authenticode signature.
resource |
---|
88a672b8b5a6b0688df10564897d3212_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
DisableThreadLibraryCalls
VirtualProtect
FreeLibrary
LoadLibraryA
GetModuleFileNameA
FlushFileBuffers
CloseHandle
CreateFileA
HeapSize
GetCurrentThreadId
GetCommandLineA
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetModuleHandleW
GetProcAddress
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetLastError
InterlockedDecrement
HeapFree
Sleep
ExitProcess
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
HeapCreate
HeapDestroy
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
SetFilePointer
WriteFile
GetConsoleCP
GetConsoleMode
EnterCriticalSection
LeaveCriticalSection
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
HeapAlloc
VirtualAlloc
HeapReAlloc
InitializeCriticalSectionAndSpinCount
RtlUnwind
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
RegisterWindowMessageA
IsWindow
GetWindowThreadProcessId
SetWindowsHookExA
SendMessageA
UnhookWindowsHookEx
SetWindowLongA
CallNextHookEx
CallWindowProcA
GetMsg
InjectDll
UnmapDll
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ