getActiveDesktop
getSpecials
getSplit
getWnd
Static task
static1
Behavioral task
behavioral1
Sample
abb96cb3ff606ec7a5324e7117a29465_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
abb96cb3ff606ec7a5324e7117a29465_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
abb96cb3ff606ec7a5324e7117a29465_JaffaCakes118
Size
16KB
MD5
abb96cb3ff606ec7a5324e7117a29465
SHA1
db5d9afba0923844f7841c15a695a8deb97451fb
SHA256
0874468e3a70d60d5a5fad2880e1cc052dc91a530436be66b714e3591c57d1bb
SHA512
cbea11d51b7fb7d88d50a0eadc9e58ebbce65bcf48e3f1ab4a4f70785cd544d8f1093dc2d2369c01b915b14df8b39887a25f8d9709f2302a9a7dcf3dd5628e18
SSDEEP
384:bHbYER8AVj3TxRLzx7XrzBTRDWr7nkIG8sCTssivYWS4EWr:bkER8AlHLt7XBUr7nkwTssivZ
Checks for missing Authenticode signature.
resource |
---|
abb96cb3ff606ec7a5324e7117a29465_JaffaCakes118 |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Sleep
GetFileAttributesA
lstrcatA
GetProcAddress
DisableThreadLibraryCalls
LoadLibraryA
GetTempPathA
CreateThread
CreateFileA
WideCharToMultiByte
VirtualFreeEx
MultiByteToWideChar
lstrcmpiA
VirtualAllocEx
lstrcmpiW
GetModuleHandleA
CloseHandle
GetCurrentProcessId
GetFileSize
lstrcmpA
lstrlenA
MapViewOfFile
UnmapViewOfFile
VirtualFree
GetSystemDirectoryA
VirtualAlloc
CreateFileMappingW
VirtualProtect
GetModuleHandleW
GetModuleFileNameA
IsBadReadPtr
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
MessageBoxA
CallNextHookEx
RtlFreeAnsiString
strstr
NtQueryInformationThread
NtClose
NtOpenProcess
RtlUnicodeStringToAnsiString
memset
memcpy
getActiveDesktop
getSpecials
getSplit
getWnd
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ