sss
ttt
Static task
static1
Behavioral task
behavioral1
Sample
94dc461caaed5cbe38563be004393c74_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
94dc461caaed5cbe38563be004393c74_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
94dc461caaed5cbe38563be004393c74_JaffaCakes118
Size
21KB
MD5
94dc461caaed5cbe38563be004393c74
SHA1
9387e90cdd58045830e9b5bf86b2496d8d364ce7
SHA256
17cef6623cc4786ebba962dfd6c222eae89a1a1b66c2eb62b7bc6eca72f7bfed
SHA512
3a5bd3bb4ccea23c4c6d727263d57beb959e2d5ee818dfbb7f2e7c56433872d21e479f71a69b247de8c84887817cae8a00bfa017d980e05e049988a6685cf415
SSDEEP
384:hqhFLRA4xW4RNomhD0bKhly8VmvvWmYRkooexIc81PtwMWMqIJhj0w3C:gRA4xW4RqmhDHvmWmnexIc8kMJD
Checks for missing Authenticode signature.
resource |
---|
94dc461caaed5cbe38563be004393c74_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
CreateFileA
GetModuleFileNameA
ExitProcess
WriteFile
GetModuleHandleA
VirtualProtectEx
GetPrivateProfileStringA
WideCharToMultiByte
GetProcAddress
LoadLibraryA
GetTempPathA
VirtualAlloc
ReadProcessMemory
SetUnhandledExceptionFilter
SetFilePointer
OpenThread
MultiByteToWideChar
TerminateProcess
CreateProcessA
GetSystemDirectoryA
GetCurrentThreadId
GetCurrentProcess
ReadFile
CloseHandle
GetCurrentProcessId
CreateMutexA
GetLastError
Sleep
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
GetCommandLineA
IsBadReadPtr
TerminateThread
SetThreadContext
CreateThread
UnhookWindowsHookEx
SetWindowsHookExA
GetForegroundWindow
CallNextHookEx
GetWindowThreadProcessId
GetWindowTextA
RegQueryValueExA
RegCloseKey
RegCreateKeyExA
fread
fopen
_stricmp
_strcmpi
_strlwr
fclose
??2@YAPAXI@Z
memcpy
strrchr
memset
sprintf
strcat
strcpy
strcmp
strlen
strstr
??3@YAXPAX@Z
strncpy
strchr
sss
ttt
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ