Command
Install
Main
Opt
Service
SetProc
Uninstall
Static task
static1
Behavioral task
behavioral1
Sample
a7c07bf73fa32ca0ac05548267378d19_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
a7c07bf73fa32ca0ac05548267378d19_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
a7c07bf73fa32ca0ac05548267378d19_JaffaCakes118
Size
564KB
MD5
a7c07bf73fa32ca0ac05548267378d19
SHA1
adae07da3cb82c4316ee1373bf5be458278ba2cb
SHA256
451b476754fdef0576d94643e91e2ba8cb45e77e83d712afc5e3b4e48bc1991a
SHA512
79feb067fa3ec7d782a5f3dde6722ae086a62c8edccd756f8a2c3232cbfcad1ffde353fedb0debfa96ea7926c89c165e6eea2f8af8726f78c1562969b7ca76a1
SSDEEP
6144:hN2GBuVrrlKryGWbTljRKk0weWqV8yQbbbqyqyxfh2odmjh81kj0iW7ae3biIO5d:hN7uRiy1pAWqubkkkKml8I+yIOsHJS
Checks for missing Authenticode signature.
resource |
---|
a7c07bf73fa32ca0ac05548267378d19_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
FreeLibrary
GetProcAddress
LoadLibraryA
VirtualProtect
VirtualFree
IsBadReadPtr
HeapFree
GetProcessHeap
HeapAlloc
HeapReAlloc
RtlUnwind
GetCurrentThreadId
GetCommandLineA
GetVersionExA
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
HeapDestroy
HeapCreate
VirtualAlloc
IsBadWritePtr
TlsAlloc
SetLastError
GetLastError
TlsFree
TlsSetValue
TlsGetValue
GetModuleHandleA
ExitProcess
TerminateProcess
GetCurrentProcess
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
UnhandledExceptionFilter
WriteFile
InitializeCriticalSection
InterlockedExchange
VirtualQuery
SetUnhandledExceptionFilter
IsBadCodePtr
GetACP
GetOEMCP
GetCPInfo
GetLocaleInfoA
GetStringTypeA
MultiByteToWideChar
GetStringTypeW
LCMapStringA
LCMapStringW
HeapSize
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetSystemInfo
SetWindowsHookExA
Command
Install
Main
Opt
Service
SetProc
Uninstall
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ