iii
jjj
Static task
static1
Behavioral task
behavioral1
Sample
9590ce34f80fcc36c23e093a6895ba71_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
9590ce34f80fcc36c23e093a6895ba71_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
9590ce34f80fcc36c23e093a6895ba71_JaffaCakes118
Size
29KB
MD5
9590ce34f80fcc36c23e093a6895ba71
SHA1
e1d67bfa13127592a48755772847b536886031f7
SHA256
10ad3f66dd4e5a1d459fb720c4c95550eb76e688df0ca523f5a6fdc892821bf6
SHA512
728b8a7d79a5d4464486af30ac48c5fd6651dc510de021f3a4555c9fe35b629c517653aea856070798904d9bb230397a89b9827f21eb14072dea4a9757cbb053
SSDEEP
768:wiQsBrXXFzSqV2X63xD+H/LbDGx+v4thY:wiQkMae6F+DbDGx+OY
Checks for missing Authenticode signature.
resource |
---|
9590ce34f80fcc36c23e093a6895ba71_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
CreateFileA
GetTempPathA
VirtualAlloc
GetCommandLineA
WriteFile
IsBadReadPtr
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
SetFilePointer
GetModuleFileNameA
ExitProcess
InitializeCriticalSection
VirtualProtectEx
VirtualProtect
GetPrivateProfileStringA
WideCharToMultiByte
LeaveCriticalSection
EnterCriticalSection
LoadLibraryA
ReadFile
SetUnhandledExceptionFilter
SetThreadContext
OpenThread
MultiByteToWideChar
TerminateProcess
CreateProcessA
GetSystemDirectoryA
GetCurrentThreadId
GetCurrentProcess
WriteProcessMemory
CloseHandle
GetLocalTime
DeleteFileA
Sleep
GetModuleHandleA
GetProcAddress
VirtualAllocEx
TerminateThread
CreateThread
lstrcatA
GetCurrentProcessId
CreateMutexA
ReadProcessMemory
GetLastError
FindWindowA
CallNextHookEx
GetAsyncKeyState
UnhookWindowsHookEx
SetWindowsHookExA
GetForegroundWindow
GetWindowTextA
ToAscii
GetWindowThreadProcessId
InternetCloseHandle
InternetReadFile
strchr
fclose
fread
fopen
_stricmp
_strcmpi
_strupr
_strlwr
??3@YAXPAX@Z
atoi
strrchr
wcslen
strcat
sprintf
strcpy
strlen
strncpy
strstr
strcmp
??2@YAPAXI@Z
memcpy
memset
iii
jjj
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ