x
y
z
Static task
static1
Behavioral task
behavioral1
Sample
a3c194f6e9f081b6d7d528cf3c49f2f7_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a3c194f6e9f081b6d7d528cf3c49f2f7_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
a3c194f6e9f081b6d7d528cf3c49f2f7_JaffaCakes118
Size
19KB
MD5
a3c194f6e9f081b6d7d528cf3c49f2f7
SHA1
e97a02a228758fc32c917b0f70e19a2592da1a73
SHA256
61a1c9669f0d8a61c57eb7af26c8cb2011b85ff5ebf96a9bcca25d64ca8415f8
SHA512
811eb1c3be1bca372056eba313d0990aabb7468ebcae0f8dda84874ff6e0c048aea972cab8857ce1f8ebd6f96b7b5b298bad13d6959254da9fece58e37a862bf
SSDEEP
384:PRDvhIAXlPioCW8aPGaKOVC+KysIh2z6pd9lrvJBvBJ:PRDbXlKvkKOEqRpd9NvJB
Checks for missing Authenticode signature.
resource |
---|
a3c194f6e9f081b6d7d528cf3c49f2f7_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetModuleHandleA
MultiByteToWideChar
MulDiv
GetTickCount
CloseHandle
WriteFile
ReadFile
CreateFileA
DeleteFileA
CreateEventA
lstrcmpA
SetFilePointer
lstrcatA
GetProcAddress
InterlockedExchange
RtlUnwind
GetTempPathA
GetTempFileNameA
HeapReAlloc
HeapFree
GetProcessHeap
HeapAlloc
WinExec
lstrlenA
GetLastError
VirtualQuery
SetFileAttributesA
GlobalAlloc
lstrcpynA
lstrcpyA
GetModuleFileNameA
GlobalFree
DestroyWindow
CloseWindow
wsprintfA
CallWindowProcA
EnableWindow
RegisterWindowMessageA
SetWindowLongA
SetDlgItemTextA
MessageBoxA
SetWindowTextA
SendMessageA
GetDlgItem
GetFocus
IsWindowVisible
ShowWindow
CharLowerBuffA
GetClientRect
GetWindowRect
CreateWindowExW
GetWindowLongA
RegSetValueExA
RegOpenKeyA
RegQueryValueExA
RegCloseKey
RegEnumValueA
RegOpenKeyExA
InternetConnectA
HttpOpenRequestA
InternetCrackUrlA
FindCloseUrlCache
FindFirstUrlCacheEntryA
InternetSetFilePointer
InternetCloseHandle
InternetOpenA
GetFileVersionInfoSizeA
GetFileVersionInfoA
x
y
z
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ