load
windows
Static task
static1
Behavioral task
behavioral1
Sample
a9aa7412c4086d2f6b1959ccc0af3d14_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a9aa7412c4086d2f6b1959ccc0af3d14_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
a9aa7412c4086d2f6b1959ccc0af3d14_JaffaCakes118
Size
20KB
MD5
a9aa7412c4086d2f6b1959ccc0af3d14
SHA1
1520d631b995a6efaf5518d012c59ace433540ac
SHA256
8447c459e5d5cb57e02ed3c5a02bda3ad57173aeb8a374cc7972b4c009558f7c
SHA512
43547a96ece65e69b3b2ec9e443541815c25c6df602fe557aeb021ff7c32b20ba5e8a95f56fdee9994c8209aae582366c063687285e6d7439e6f0dd22327bd51
SSDEEP
384:wzzB/cptAXm/UyLeb/PJ3MYpD4dyTCRPReRX3kWU:Oixm/h8mD4dT5gX0WU
Checks for missing Authenticode signature.
resource |
---|
a9aa7412c4086d2f6b1959ccc0af3d14_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
InternetReadFile
InternetCloseHandle
InternetOpenA
InternetOpenUrlA
GetVersionExA
CloseHandle
GetTempPathA
DeleteFileA
lstrcpynA
GetProcAddress
GetTempFileNameA
LoadLibraryA
GetModuleFileNameA
CreateThread
GetLongPathNameA
TerminateProcess
WaitForSingleObject
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
ExitProcess
EndPaint
GetMessageA
SetTimer
RegisterClassExA
PostQuitMessage
KillTimer
BeginPaint
TranslateMessage
CreateWindowExA
TranslateAcceleratorA
DefWindowProcA
LoadAcceleratorsA
DispatchMessageA
LoadCursorA
LoadIconA
RegQueryValueExA
RegOpenKeyA
RegCloseKey
RegOpenKeyExA
Shell_NotifyIconA
_strlwr
_mbsstr
fclose
fseek
strrchr
fwrite
fread
fopen
??2@YAPAXI@Z
_initterm
_adjust_fdiv
__CppXcptFilter
_except_handler3
__dllonexit
_onexit
atoi
malloc
free
sprintf
__security_error_handler
??3@YAXPAX@Z
load
windows
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ