afasabaxu
anamivoni
eyuzoco
hequdiyuwokol
icakegoha
inenukekene
kixotuqajo
obupikiw
xijuwixa
Static task
static1
Behavioral task
behavioral1
Sample
8a9c386a9cdd20b25e0b2951035a7b44_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
8a9c386a9cdd20b25e0b2951035a7b44_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
8a9c386a9cdd20b25e0b2951035a7b44_JaffaCakes118
Size
365KB
MD5
8a9c386a9cdd20b25e0b2951035a7b44
SHA1
6972a4ad3e65d82b9948f4047839cf95ea93c8f8
SHA256
365480069148c38c7c747ac39168ce357f8a3127ed298e367d11fa30c4639712
SHA512
1fabc6eff88906fbf457fe2e6f46193f0e34be6e0808b69b8c2ab0fa24cebf9215fafeb47ca917c32ee519612d9e83d6d9d17c9c000a4ea50f8b6185ff7c3118
SSDEEP
6144:pyHra36t+1YvGIqT35ZjLIUmOhRQ940iW4tNqM++GdLJM4VbkxNyQ+8Ov:cLAu+CvDqnjLIUnQcNodhhVbk7Y
Checks for missing Authenticode signature.
resource |
---|
8a9c386a9cdd20b25e0b2951035a7b44_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetProcAddress
LoadLibraryA
ExitProcess
GetCurrentThreadId
GetCommandLineA
GetVersionExA
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetModuleFileNameA
GetModuleHandleA
TerminateProcess
GetCurrentProcess
TlsAlloc
SetLastError
GetLastError
TlsFree
TlsSetValue
TlsGetValue
HeapFree
HeapAlloc
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
UnhandledExceptionFilter
WriteFile
RtlUnwind
InterlockedExchange
VirtualQuery
LeaveCriticalSection
EnterCriticalSection
GetACP
GetOEMCP
GetCPInfo
VirtualAlloc
HeapReAlloc
InitializeCriticalSection
HeapSize
GetLocaleInfoA
GetStringTypeA
MultiByteToWideChar
GetStringTypeW
LCMapStringA
LCMapStringW
VirtualProtect
GetSystemInfo
GetFocus
afasabaxu
anamivoni
eyuzoco
hequdiyuwokol
icakegoha
inenukekene
kixotuqajo
obupikiw
xijuwixa
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ