67j6uj67sDllInitialize
COMResModuleInstance
com
dnr
dns
dnt
dny
ergerDrawTextEx
ftsWordBreak
ins
j67jysTabbedoyno
o0yfsUseGDIWidthCache
o6yergereyno
o7gregreharacterPlacement
o8y9sGetTextExtentExPoint
o9y0sPSMoyno
oergersEditControl
Static task
static1
Behavioral task
behavioral1
Sample
b0fb88944a8c0052ef5c4d11e6acb4eb_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b0fb88944a8c0052ef5c4d11e6acb4eb_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
b0fb88944a8c0052ef5c4d11e6acb4eb_JaffaCakes118
Size
195KB
MD5
b0fb88944a8c0052ef5c4d11e6acb4eb
SHA1
92af0b1f16946e2b8f4812a3e02f03d6441cddb1
SHA256
8ccaf68111dd0d5ba128543500bfe9a58b418a3ec6d555ff6f39a89cdf749b58
SHA512
4e58946e7e0c599f133bf00f99da30ef990cb5dc6b8891a6e7f6ad2ed59fe0deae1cc388a3766c7020bbc968201401a010a2c33aa3627e223d8a0e4be0e00d23
SSDEEP
192:UN5Zje43zVro8S68Y/L5ZuFebeh5tjleUb:UN+45ki82aFebizjl9b
Checks for missing Authenticode signature.
resource |
---|
b0fb88944a8c0052ef5c4d11e6acb4eb_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
lstrcmpiA
Process32First
CreateToolhelp32Snapshot
WriteProcessMemory
WideCharToMultiByte
lstrlenA
lstrlenW
Module32Next
Module32First
GetWindowsDirectoryA
Process32Next
lstrcatA
VirtualFreeEx
WaitForSingleObject
CreateRemoteThread
VirtualAllocEx
FindClose
FindNextFileA
FindFirstFileA
GetCurrentThreadId
DeleteFileA
FreeLibrary
OpenEventA
SetEvent
LoadLibraryA
CreateMutexA
ReleaseMutex
RtlZeroMemory
OpenProcess
GetLastError
RtlFillMemory
lstrcpyA
GetCurrentProcessId
Sleep
lstrcmpA
GetModuleFileNameA
CreateThread
CloseHandle
GetMessageA
PostThreadMessageA
GetWindowThreadProcessId
UnhookWindowsHookEx
EnumWindows
SetWindowsHookExA
wsprintfA
CallNextHookEx
LookupPrivilegeValueA
AdjustTokenPrivileges
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
OpenProcessToken
PathFileExistsA
StrStrIA
strcat
strcpy
strrchr
67j6uj67sDllInitialize
COMResModuleInstance
com
dnr
dns
dnt
dny
ergerDrawTextEx
ftsWordBreak
ins
j67jysTabbedoyno
o0yfsUseGDIWidthCache
o6yergereyno
o7gregreharacterPlacement
o8y9sGetTextExtentExPoint
o9y0sPSMoyno
oergersEditControl
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ