ENTER_WORK
JOB_MAIN
TASK_ONE
Static task
static1
Behavioral task
behavioral1
Sample
b1b1dbdd35d441e8c0acdb47aa348e6f_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b1b1dbdd35d441e8c0acdb47aa348e6f_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
b1b1dbdd35d441e8c0acdb47aa348e6f_JaffaCakes118
Size
28KB
MD5
b1b1dbdd35d441e8c0acdb47aa348e6f
SHA1
9f3dafc178bc016eca5b2eff8ef551c94c0482e9
SHA256
17b1b4fc264f618744736724edc9f0ce5155471b3c646b45989aa6ae6a17c0a7
SHA512
b52fff7dc2c4cf79a71d2b6e2db77ee4e92be26dceb3b15b8a3faa8d8ba7aed87be6ef2a362c2457a520ecc72d0d156c5e87cb4601b552e91e30438a6d27f840
SSDEEP
192:xvOF8qyd6pEPZHSrMBYjpewHv39uSFm4QSPLNeu6:Lqyd5kM6xH/nFfPq
Checks for missing Authenticode signature.
resource |
---|
b1b1dbdd35d441e8c0acdb47aa348e6f_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
lstrcpyA
MoveFileA
DeleteFileA
SetFileAttributesA
CloseHandle
GetCurrentProcess
FindFirstFileA
OpenProcess
FreeLibrary
VirtualFreeEx
ReadProcessMemory
WaitForSingleObject
CreateRemoteThread
GetProcAddress
LoadLibraryA
WriteProcessMemory
lstrcatA
lstrlenA
ReleaseMutex
GetLastError
CreateMutexA
lstrcmpA
GetSystemTime
Sleep
GetVersionExA
GetSystemDirectoryA
GetComputerNameA
WriteFile
ReadFile
GetCurrentThread
CreateProcessA
CreatePipe
WinExec
VirtualAllocEx
FindNextFileA
FileTimeToSystemTime
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
send
recv
socket
htons
ioctlsocket
connect
select
WSAStartup
inet_addr
gethostbyname
closesocket
_write
_stricmp
wcscpy
_lseek
_adjust_fdiv
malloc
_initterm
free
_beginthread
sprintf
_open
_close
_endthread
strtol
strstr
_read
atoi
fopen
strncmp
fputs
fclose
fgets
EnumProcesses
GetModuleBaseNameA
EnumProcessModules
ENTER_WORK
JOB_MAIN
TASK_ONE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ