getActiveDesktop
getSpecials
getSplit
getWnd
Static task
static1
Behavioral task
behavioral1
Sample
b4ee34fe10251a176083d4cf77a38710_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b4ee34fe10251a176083d4cf77a38710_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
b4ee34fe10251a176083d4cf77a38710_JaffaCakes118
Size
16KB
MD5
b4ee34fe10251a176083d4cf77a38710
SHA1
d2022a54da11c83a00cad689541ada063f361931
SHA256
12ad8b25d072a355bc5936566d9e6325ba2e51df0daa1a35b10e5c9d9014f0a1
SHA512
319a83a2ea3ba9bc8a7c13e06dedd1327d47caf1873b14c7dba2f038a425dfc055b4415d2490ad462739b343ecac4b09e3578f0f94bda56d8dfb6ff838e63f18
SSDEEP
384:ayuhWmkO8A7YR0xRLzx7XrzBTRDWrpro8sCKWS4EWr:ayakO8AaeLt7XBUrp7T
Checks for missing Authenticode signature.
resource |
---|
b4ee34fe10251a176083d4cf77a38710_JaffaCakes118 |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Sleep
GetFileAttributesA
lstrcatA
GetProcAddress
DisableThreadLibraryCalls
LoadLibraryA
GetTempPathA
CreateThread
CreateFileA
WideCharToMultiByte
VirtualFreeEx
MultiByteToWideChar
lstrcmpiA
VirtualAllocEx
lstrcmpiW
GetModuleHandleA
CloseHandle
GetCurrentProcessId
GetFileSize
lstrcmpA
lstrlenA
MapViewOfFile
UnmapViewOfFile
VirtualFree
GetSystemDirectoryA
VirtualAlloc
CreateFileMappingW
VirtualProtect
GetModuleHandleW
GetModuleFileNameA
IsBadReadPtr
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
MessageBoxA
CallNextHookEx
RtlFreeAnsiString
strstr
NtQueryInformationThread
NtClose
NtOpenProcess
RtlUnicodeStringToAnsiString
memset
memcpy
getActiveDesktop
getSpecials
getSplit
getWnd
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ