fa
fb
Static task
static1
Behavioral task
behavioral1
Sample
aec020d9dc5cac3b8ce070c62c74bc07_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
aec020d9dc5cac3b8ce070c62c74bc07_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
aec020d9dc5cac3b8ce070c62c74bc07_JaffaCakes118
Size
8KB
MD5
aec020d9dc5cac3b8ce070c62c74bc07
SHA1
2e38229081a6354905a7abb3ac0cda821ee05d42
SHA256
9b4dec1fc46f0fe02e0554c3cc0c86335d295bdbc74217cd9f258b69726c047e
SHA512
060dc293a0efd15647a6356b94df6d6d8d30add86f585665406d7b5102563b25b5adc0e6c0ffa5632b94c5413d8b77040bc6e0968513626197fca21f6a99c51c
SSDEEP
96:xWb+H7Uhh+Lk4giIvel/9rWbfENMFmuANE4EaflLCH63MD:kawT+I4yFVWnLwH63M
Checks for missing Authenticode signature.
resource |
---|
aec020d9dc5cac3b8ce070c62c74bc07_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
WideCharToMultiByte
GetPrivateProfileStringA
Sleep
ReadProcessMemory
CreateThread
GlobalFree
GlobalLock
GlobalAlloc
GetCommandLineA
GetModuleFileNameA
GetCurrentProcess
WriteProcessMemory
UnhookWindowsHookEx
CallNextHookEx
SetWindowsHookExA
InternetCloseHandle
InternetOpenUrlA
InternetOpenA
InternetReadFile
_adjust_fdiv
_stricmp
malloc
_initterm
free
strstr
??3@YAXPAX@Z
strrchr
strcpy
sprintf
??2@YAPAXI@Z
strlen
memcpy
memset
fa
fb
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ