Ej
GetProcessID
In
Static task
static1
Behavioral task
behavioral1
Sample
a782e36bfb3574fb882622fa537f3572_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a782e36bfb3574fb882622fa537f3572_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
a782e36bfb3574fb882622fa537f3572_JaffaCakes118
Size
31KB
MD5
a782e36bfb3574fb882622fa537f3572
SHA1
ec8ce22c8a9b3bb42f5eaa6e2e8b69499c8f04fa
SHA256
5adc2224a4faa6fd7cd27cf3990b6ae9265d5db3c966b8aa432738a943ce4c8a
SHA512
16935ee6e740b8c7f702782e38833d2b8af77fa2e961df666f9fe427cca1b618e57ac9e4b27d32a43389f62af778fe6261ba91b90ce738d2b0ac0e13a367f9fc
SSDEEP
768:wMp+uO0TkqqjM8Aq4W2LS4aZmagJ7DLy:w0fO0TuMS4W2LDa0py
Checks for missing Authenticode signature.
resource |
---|
a782e36bfb3574fb882622fa537f3572_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
IMAGE_FILE_DLL
GetModuleHandleA
GetProcAddress
SetTimer
OpenProcessToken
Ej
GetProcessID
In
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE