DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
a5802a06e4dee3fe7e7e470a29150456_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
a5802a06e4dee3fe7e7e470a29150456_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Target
a5802a06e4dee3fe7e7e470a29150456_JaffaCakes118
Size
205KB
MD5
a5802a06e4dee3fe7e7e470a29150456
SHA1
01d82d416096b9776313c930416662943f310654
SHA256
d9fe58131199a2fb8175e213d838a852655d92fece372676726ccb18eb54864f
SHA512
6eba4a9077b4c997b490db04ed40c80418682a51c77c7d1d84212ef51c7d410582df2e446d2b59942c8d46a8d60d87cae2b29008c9b9d55ced14fbd9faf3529f
SSDEEP
3072:TMg1/mVuoeYonh94ebQu1q8OMbHPtMXV1HwH6POdqXSa4QXvJ:wglSuYoj4uTeXq6HSab
Checks for missing Authenticode signature.
resource |
---|
a5802a06e4dee3fe7e7e470a29150456_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
RtlUnwind
RtlZeroMemory
ScrollConsoleScreenBufferA
RtlMoveMemory
VerSetConditionMask
lstrcpyA
RtlFillMemory
RtlCaptureStackBackTrace
RtlCaptureContext
RegisterWaitForSingleObjectEx
ReadFileScatter
CompareStringA
SetupComm
CloseHandle
RtlIpv6StringToAddressExA
RtlSubtreePredecessor
ClientToScreen
WindowFromDC
GetFontLanguageInfo
PaintRgn
SetMetaRgn
DeleteObject
GdiFlush
GetBkColor
Chord
PathRemoveBackslashA
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ