DoWorkEx
DoWorkWl
Static task
static1
Behavioral task
behavioral1
Sample
a1b91d315ae4811821c06a951754b399_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a1b91d315ae4811821c06a951754b399_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
a1b91d315ae4811821c06a951754b399_JaffaCakes118
Size
30KB
MD5
a1b91d315ae4811821c06a951754b399
SHA1
9b18bbc0f308914bb697c922a768856e39bcfb4b
SHA256
50cbb0768871f682f26e0dcf913a33b23f423a37a648eabccef8d524a712195d
SHA512
f1c88c1dcac08b1e89e8eafcdfc85082dec960fc1314d29667c0a5e7d90e0e8313743d8d3ff07fac0505cd8298aed5eeec77197cb55ef313a21919bacb221e28
SSDEEP
192:VX9X9m32cyfop26KaomoLKrc6cH9zHJE4rySt80Noj7tf0:VXRO2jFpeVcHw4rySt5Otf0
Checks for missing Authenticode signature.
resource |
---|
a1b91d315ae4811821c06a951754b399_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
lstrlenA
CloseHandle
WriteFile
CreateFileA
lstrcmpiA
GetModuleFileNameA
DisableThreadLibraryCalls
CreateThread
SetFileTime
GetFileTime
GetEnvironmentVariableA
Sleep
DeleteFileA
FreeLibraryAndExitThread
ExitProcess
WaitForSingleObject
GetProcAddress
lstrcmpA
ReadFile
SetFilePointer
Process32Next
Process32First
CreateToolhelp32Snapshot
OpenProcess
CreateProcessA
GetSystemDirectoryA
GetStartupInfoA
VirtualFreeEx
CreateRemoteThread
GetModuleHandleA
WriteProcessMemory
VirtualAllocEx
lstrlenW
MultiByteToWideChar
GetCurrentProcess
lstrcpyA
FreeLibrary
CreateEventA
LoadLibraryA
WaitForInputIdle
wsprintfA
AdjustTokenPrivileges
OpenProcessToken
LookupPrivilegeValueA
HttpQueryInfoA
InternetReadFile
InternetCloseHandle
InternetOpenUrlA
InternetOpenA
__CxxFrameHandler
_adjust_fdiv
malloc
_initterm
free
_except_handler3
memcpy
memset
??3@YAXPAX@Z
??2@YAPAXI@Z
_EH_prolog
strchr
DoWorkEx
DoWorkWl
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ