bbb
kingsoft
Static task
static1
Behavioral task
behavioral1
Sample
8ca785682627d36f8fa76867bec51d7b_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
8ca785682627d36f8fa76867bec51d7b_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
8ca785682627d36f8fa76867bec51d7b_JaffaCakes118
Size
28KB
MD5
8ca785682627d36f8fa76867bec51d7b
SHA1
a43c5d38f9635415b27d35c80c4ca580786f8386
SHA256
e6b02519783ff07daca6a6c6e8951e4d848bccf3b82990529a75f918b074a7ca
SHA512
d6af4d7bcb59ae6c776ed6d9860fea8b37859e3e5aef8020818623aa68ed26747c0f562f90356dd409b9a4a2f5e2d363ecd5ef210e126dfa5e315126c329a397
SSDEEP
768:amMHHX22gOo9T+pylexwpuQRneJwcbRbrO:F/z+ptxwqO
Checks for missing Authenticode signature.
resource |
---|
8ca785682627d36f8fa76867bec51d7b_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GlobalLock
GlobalAlloc
GetLastError
CreateMutexA
GetCurrentProcessId
ExitProcess
ResumeThread
WriteProcessMemory
VirtualProtectEx
OpenProcess
GetModuleFileNameA
ReadProcessMemory
GetModuleHandleA
GetPrivateProfileStringA
DeleteFileA
ReadFile
GetTempPathA
VirtualAlloc
WideCharToMultiByte
GlobalUnlock
CreateProcessA
GetSystemDirectoryA
GetTickCount
RaiseException
GetLocalTime
GetCurrentThreadId
SetFilePointer
InitializeCriticalSection
VirtualProtect
LeaveCriticalSection
EnterCriticalSection
Process32First
CreateToolhelp32Snapshot
GlobalFree
GetCommandLineA
IsBadReadPtr
TerminateThread
CreateThread
CreateFileA
WriteFile
CloseHandle
Sleep
GetCurrentProcess
TerminateProcess
LoadLibraryA
MultiByteToWideChar
GetProcAddress
GetWindowTextA
CallNextHookEx
GetWindowThreadProcessId
ImageLoad
ImageUnload
_strupr
_strlwr
_strcmpi
_stricmp
wcslen
atol
srand
strcpy
sprintf
strlen
memcpy
??2@YAPAXI@Z
strrchr
memset
strcat
??3@YAXPAX@Z
strncpy
strchr
strstr
strcmp
__CxxFrameHandler
rand
bbb
kingsoft
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ