GetName
_GetName@16
Static task
static1
Behavioral task
behavioral1
Sample
a5156ec585f934fa1589fe3d24f82d66_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a5156ec585f934fa1589fe3d24f82d66_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
a5156ec585f934fa1589fe3d24f82d66_JaffaCakes118
Size
64KB
MD5
a5156ec585f934fa1589fe3d24f82d66
SHA1
31d8cadc6acfd791ee681b80f2d22780e9f6be92
SHA256
859bec86fa7ecd54c72cb268ffc58bd5defbc626d63e7414b46cfe3082525ea1
SHA512
979899927136ecd2419985e72fc6c5ed27eafb77614f885183780da22b9531ae6e890c872c2a663705292f2163f6e2f230b4372319341f49aa6b47519e4155b2
SSDEEP
384:vS7eetIY2uQ0uWrPHD71vsBC7ikH6eiELzNwyeve+sGNoqvFe4wvDUwDFAe4IRy7:aCeNvt2yuEGOqdN9gAePR
Checks for missing Authenticode signature.
resource |
---|
a5156ec585f934fa1589fe3d24f82d66_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
ReleaseMutex
GetLastError
VirtualFreeEx
WriteProcessMemory
VirtualAllocEx
lstrcmpiA
FindClose
FindNextFileA
FindFirstFileA
lstrcatA
GetSystemDirectoryA
CloseHandle
GetCurrentProcess
Module32First
VirtualProtectEx
LocalAlloc
GetFileSize
CopyFileA
GetModuleFileNameA
TerminateProcess
GlobalFree
GlobalUnlock
DeleteFileA
DisableThreadLibraryCalls
IsBadReadPtr
CreateFileA
GetCurrentProcessId
GetTickCount
WaitForSingleObject
GetWindowsDirectoryA
Sleep
GetModuleHandleA
CreateMutexA
LoadLibraryA
GetProcAddress
lstrcpyA
ReadFile
lstrlenA
GetWindowRect
GetForegroundWindow
GetWindowTextA
ReleaseDC
wsprintfA
GetDC
GetPaletteEntries
CreateHalftonePalette
DeleteObject
GetNearestPaletteIndex
LookupPrivilegeValueA
CryptAcquireContextA
CryptCreateHash
CryptHashData
CryptGetHashParam
OpenProcessToken
CryptReleaseContext
CryptDestroyHash
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
StrStrIA
memcpy
free
_onexit
_purecall
_itoa
isprint
sscanf
strlen
__dllonexit
strstr
strncat
memcmp
strcmp
atoi
memset
strcpy
_beginthreadex
__CxxFrameHandler
fclose
fputc
fwrite
fopen
fflush
??2@YAPAXI@Z
strncpy
WSAStartup
gethostbyname
getpeername
GetName
_GetName@16
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ