e
l
r
Static task
static1
Behavioral task
behavioral1
Sample
b33ab591f66db653f587ea42dfcfd487_JaffaCakes118.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
b33ab591f66db653f587ea42dfcfd487_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
b33ab591f66db653f587ea42dfcfd487_JaffaCakes118
Size
20KB
MD5
b33ab591f66db653f587ea42dfcfd487
SHA1
6eaa8c03e2d36d900ff4880062ae67992996581f
SHA256
946120c9ab55b62250b6a7a7d5627a5dcdb66feeb8845710949539e2c7f634a9
SHA512
a14f044d09f3505d448b44f20920d959de9b7ee99be55937b0b640e570365fadc8335e7bc51a0cf942e573b28be9e9fbd9253954ea9435b05fefc2c8ac805905
SSDEEP
384:tfMhxhSfU/C7lXXFQy2+fC+d+KTj9fuKOKD8Rzht5jcnWdFxLuCvX6lB/:tfMhx6UKhnFQyB1j9fCKklt5jcnWdLLN
Checks for missing Authenticode signature.
resource |
---|
b33ab591f66db653f587ea42dfcfd487_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
CreateEventA
GetFileAttributesA
ReadFile
lstrcatA
MultiByteToWideChar
GetProcAddress
GlobalFree
GetModuleFileNameA
GetModuleHandleA
CloseHandle
GetTempPathA
lstrcpyA
InterlockedExchange
WideCharToMultiByte
GlobalAlloc
WriteFile
GetProcessHeap
GetTickCount
HeapFree
HeapAlloc
GetCurrentProcessId
GetCurrentThreadId
FindClose
SetFileAttributesA
GetThreadLocale
GetLastError
HeapReAlloc
lstrcpynA
SetFilePointer
lstrcmpA
CreateFileA
RtlUnwind
GetSystemDefaultLCID
GetUserDefaultLCID
PulseEvent
lstrlenA
GetCurrentProcess
VirtualQuery
SetDlgItemTextA
CallWindowProcA
EnableWindow
SetWindowTextA
IsWindowVisible
DestroyWindow
GetWindowRect
GetFocus
wsprintfA
GetClientRect
SendMessageA
RegisterWindowMessageA
wsprintfW
SetWindowLongA
MessageBoxA
GetWindowLongA
CreateWindowExA
GetDlgItem
ShowWindow
CreateWindowExW
RegSetValueExA
RegCloseKey
RegOpenKeyA
RegOpenKeyExA
RegQueryValueExA
HttpOpenRequestA
InternetSetFilePointer
InternetOpenA
InternetCloseHandle
InternetConnectA
e
l
r
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ