mrecv
msend
Static task
static1
Behavioral task
behavioral1
Sample
b2b4bbcf5c2f33180778ec86758499c4_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b2b4bbcf5c2f33180778ec86758499c4_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
b2b4bbcf5c2f33180778ec86758499c4_JaffaCakes118
Size
44KB
MD5
b2b4bbcf5c2f33180778ec86758499c4
SHA1
dd9ccf5f25b89bdf71052391a3fa2f0ecfe92ac5
SHA256
0681fbc504ec5d4859a4a1ff4e3ebc3cacebf0bbada587b6f3fa2f59f3069890
SHA512
d3038ce5f9006cc11459d18c59383fe8907dcbcb79efd551ea98e6aee3df5c5cde611f6a228e457fe6a3fdb4db4814e6ed0246865c44bb6626e221eff0d5703a
SSDEEP
768:lQzxhkbilrNOibTduUpRadva8Ptb7lh1FlMSx:lixhXxOoTduUpovtVRlT
Checks for missing Authenticode signature.
resource |
---|
b2b4bbcf5c2f33180778ec86758499c4_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
VirtualProtectEx
WriteProcessMemory
GetCurrentProcess
GetProcAddress
GetModuleHandleA
CreateThread
GetModuleFileNameA
CloseHandle
GlobalAlloc
GetCommandLineA
RtlUnwind
GlobalLock
ReadProcessMemory
Sleep
GlobalFree
GetVersion
ExitProcess
TerminateProcess
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
GetLastError
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
HeapFree
WriteFile
SetFilePointer
EnterCriticalSection
LeaveCriticalSection
InterlockedDecrement
InterlockedIncrement
InitializeCriticalSection
HeapAlloc
GetCPInfo
GetACP
GetOEMCP
VirtualAlloc
HeapReAlloc
LoadLibraryA
SetStdHandle
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
FlushFileBuffers
GetAsyncKeyState
ToAscii
GetKeyboardState
UnhookWindowsHookEx
SetWindowsHookExA
CallNextHookEx
LookupPrivilegeValueA
AdjustTokenPrivileges
OpenProcessToken
InternetOpenA
InternetOpenUrlA
InternetCloseHandle
mrecv
msend
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ