x
y
z
Static task
static1
Behavioral task
behavioral1
Sample
acfc98402c75b91a4ee393215cffcd3d_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
acfc98402c75b91a4ee393215cffcd3d_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
acfc98402c75b91a4ee393215cffcd3d_JaffaCakes118
Size
32KB
MD5
acfc98402c75b91a4ee393215cffcd3d
SHA1
c7f67ac85f0ba755d175175bbca8b55d107aeb1a
SHA256
ecf840486ac61606cb20425d3e3af660dd1de961e775950bcd2ae36cdf17e532
SHA512
b875fc5d9a05c6b46ab4bdc2984caeb9bd231e37197a12eb2f6182549bcdf6fa28195cc0e44d86d6697616269e40ebefd06864264542eedc51640cf06f548875
SSDEEP
384:RLS8u+yjQVrMYk9a2GHWGzqyH/EGFK2DotXhAGuabLz6JBvzglzjMI6:M8ur0VrMpu/AKGua/z6JBbg5jM
Checks for missing Authenticode signature.
resource |
---|
acfc98402c75b91a4ee393215cffcd3d_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetTempPathA
MulDiv
GetTickCount
CloseHandle
WriteFile
ReadFile
CreateFileA
WaitForMultipleObjects
WaitForSingleObject
DeleteFileA
CreateEventA
SetFilePointer
GetModuleFileNameA
GetTempFileNameA
InterlockedExchange
RtlUnwind
HeapReAlloc
HeapFree
GetProcessHeap
HeapAlloc
GetModuleHandleA
FreeLibrary
GetProcAddress
lstrlenA
CreateProcessA
ExitThread
CreateThread
GetLastError
SetEvent
GlobalFree
GlobalAlloc
lstrcpynA
lstrcpyA
VirtualQuery
GetForegroundWindow
CallWindowProcA
DestroyWindow
EnableWindow
GetWindowLongA
CreateWindowExA
GetWindowRect
RegisterWindowMessageA
SetWindowLongA
SetDlgItemTextA
MessageBoxA
wsprintfA
SetWindowTextA
SendMessageA
GetDlgItem
GetFocus
IsWindowVisible
CloseWindow
MsgWaitForMultipleObjects
DispatchMessageA
TranslateMessage
PeekMessageA
CharLowerBuffA
ShowWindow
GetClientRect
RegCloseKey
RegOpenKeyExA
RegOpenKeyA
RegQueryValueExA
RegEnumValueA
InternetReadFile
InternetSetFilePointer
InternetOpenA
InternetCloseHandle
InternetCrackUrlA
FindCloseUrlCache
FindFirstUrlCacheEntryA
InternetConnectA
HttpOpenRequestA
HttpSendRequestA
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
x
y
z
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ