RemoveHeur
ScanHeur
Static task
static1
Behavioral task
behavioral1
Sample
ac153a4f1ff0c34d58a23555dbc66763_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
ac153a4f1ff0c34d58a23555dbc66763_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
ac153a4f1ff0c34d58a23555dbc66763_JaffaCakes118
Size
56KB
MD5
ac153a4f1ff0c34d58a23555dbc66763
SHA1
cc3ae10ea684d2cbe113274790185e4e9676cdb7
SHA256
05f56d55064b9261f62baa557b892d0545f4e90d79ba9c3e56dfe977471f6f77
SHA512
754afc187ca559e7ae007bd206b8ff64f3f4726b69abe7363a88ef2982711a43bdc14f8effab5cc154911b07101b8d7e9ff15ee1c7860b8a2137d490ff2d1005
SSDEEP
768:phes5D57IoX9Yfml11yZFsLTxW4dMJD6JUGlWgDlox0pAgjs:phtKmlmnsLTkUJqshou
Checks for missing Authenticode signature.
resource |
---|
ac153a4f1ff0c34d58a23555dbc66763_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
MoveFileExA
GetCompressedFileSizeA
FileTimeToDosDateTime
FindFirstFileA
FindNextFileA
FindClose
GetTickCount
GetLastError
Sleep
GetProcessHeap
HeapAlloc
HeapFree
GetWindowsDirectoryA
GetSystemDirectoryA
GetTempPathA
RtlUnwind
GetCommandLineA
GetVersion
ExitProcess
TerminateProcess
GetCurrentProcess
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
TlsGetValue
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
WriteFile
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetCPInfo
GetACP
GetOEMCP
VirtualAlloc
HeapReAlloc
GetProcAddress
LoadLibraryA
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
wsprintfA
OpenSCManagerA
DeleteService
QueryServiceStatus
EnumDependentServicesA
OpenServiceA
ControlService
CloseServiceHandle
RegOpenKeyExA
RegEnumValueA
RegQueryValueExA
RegCreateKeyExA
RegCloseKey
RegEnumKeyExA
RemoveHeur
ScanHeur
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ