Ctotbnwxctq
kdzxbde
Static task
static1
Behavioral task
behavioral1
Sample
b0ff90affacba4108a828829cda2ec79_JaffaCakes118.dll
Resource
win7-20240708-en
Target
b0ff90affacba4108a828829cda2ec79_JaffaCakes118
Size
67KB
MD5
b0ff90affacba4108a828829cda2ec79
SHA1
0468bab7906c5399e4d6d43f876e3711e6bbdbaf
SHA256
e5bff850be3f97a633492f252c3db7ca66900cbe883e1e731ae4303c529f494e
SHA512
8c84a9951d47decfd0327b19a6426957e17421cede9a8e43fbd1c739121f40676ceec5569d854a91da19fa819ad27f811f634bdc19a10a747f91a5bf1fe3ef41
SSDEEP
768:Pax472yZZGGcSDty1atIqDQotqiM1Wzte6lUjyM39pdDhCkyWaPaoADCC+noXXUc:P9tGctOamqDxtMcteYSttaywCKRDpy
Checks for missing Authenticode signature.
resource |
---|
b0ff90affacba4108a828829cda2ec79_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
VirtualAlloc
GetCommandLineA
GetCurrentThreadId
HeapFree
GetVersionExA
HeapAlloc
GetProcessHeap
RtlUnwind
GetProcAddress
GetModuleHandleA
ExitProcess
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetLastError
InterlockedDecrement
Sleep
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
WriteFile
LeaveCriticalSection
EnterCriticalSection
LoadLibraryA
InitializeCriticalSection
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
HeapReAlloc
HeapSize
MultiByteToWideChar
GetLocaleInfoA
GetStringTypeA
GetStringTypeW
LCMapStringA
LCMapStringW
Ctotbnwxctq
kdzxbde
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ