_CallProc@12
_Init@0
_Uninit@0
Static task
static1
Behavioral task
behavioral1
Sample
a7f6c5d8f25e921c16d3360867139ba2_JaffaCakes118.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
a7f6c5d8f25e921c16d3360867139ba2_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
a7f6c5d8f25e921c16d3360867139ba2_JaffaCakes118
Size
55KB
MD5
a7f6c5d8f25e921c16d3360867139ba2
SHA1
c96ef36b95c6d21931bc4f89ec09d365850c44bf
SHA256
1e868f4ebbe097f53b2420a91acae1632b84ae5afcf5268b3cfe61d7153c2c40
SHA512
aa8898edb931e15cb094e2a884ddd604b13e04e1d847c9bd1c14d628878f0dbe30188f0b7525691e8a92c27fc9e073ff2374f7b7689961a25bbe11e34a2b3b20
SSDEEP
768:SCcQvZuwRTo+1qnrVaf3wCs8QEU+4EBhhT6vSWJ4tDkhO/7iB9M6RFOY9X5QO42D:L0KToXrVKgZD2hT6ZEDkheOFO/OXok
Checks for missing Authenticode signature.
resource |
---|
a7f6c5d8f25e921c16d3360867139ba2_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
VirtualProtect
VirtualLock
GetProcessHeap
GetModuleFileNameA
GetTickCount
UnmapViewOfFile
CloseHandle
MapViewOfFile
CreateFileMappingA
CreateFileA
GetLastError
WriteFile
GetSystemDirectoryA
LoadLibraryA
LoadResource
FindResourceA
DeleteFileA
Sleep
WinExec
GetTempFileNameA
SetEnvironmentVariableA
CompareStringW
CompareStringA
GetProcAddress
HeapAlloc
HeapFree
GetLocalTime
GetTimeFormatA
GetDateFormatA
lstrcpynA
lstrcatA
CreateThread
lstrcpyA
ExitThread
SizeofResource
lstrlenA
LCMapStringW
LCMapStringA
GetOEMCP
RtlUnwind
GetTimeZoneInformation
GetSystemTime
GetCommandLineA
GetVersion
HeapDestroy
HeapCreate
VirtualFree
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
ExitProcess
VirtualAlloc
HeapReAlloc
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
GetModuleHandleA
TerminateProcess
GetCurrentProcess
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
InterlockedDecrement
InterlockedIncrement
MultiByteToWideChar
GetStringTypeA
GetStringTypeW
GetCPInfo
GetACP
UnhookWindowsHookEx
GetWindowTextA
GetForegroundWindow
CallNextHookEx
SetWindowsHookExA
wsprintfA
CreateServiceA
OpenServiceA
StartServiceA
CloseServiceHandle
RegOpenKeyExA
RegEnumKeyA
GetUserNameA
RegCloseKey
RegQueryValueExA
RegSetValueExA
RegCreateKeyExA
OpenSCManagerA
InternetSetCookieA
InternetGetCookieA
InternetCloseHandle
InternetConnectA
InternetQueryOptionA
InternetOpenUrlA
_CallProc@12
_Init@0
_Uninit@0
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE