?catch4@@YAXKK@Z
DllMain
HookWin32Api
catchxx1
catchxx2
Static task
static1
Behavioral task
behavioral1
Sample
b7847cb24b41f89beb0a9f33d5e659a3_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b7847cb24b41f89beb0a9f33d5e659a3_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
b7847cb24b41f89beb0a9f33d5e659a3_JaffaCakes118
Size
21KB
MD5
b7847cb24b41f89beb0a9f33d5e659a3
SHA1
84e85f3e64a03cdcff6175fcc62f41952ffc0040
SHA256
12fc4a2b24ce7051bf1194aa09859b92cad08a21af5eef6d35d4bf2c2b16469f
SHA512
9e8d91bb75257b12e431374c78d33e49704f2d12146bcb142151771defa666b34c80d84fd714b276a2d09c04f9ee55e55c7da1a5689028cc6f175899a2ab491f
SSDEEP
384:RvhZpbkawYCZB1yVyliXrgCjPwyMC78oy8Wr5:9mr1yyisCjIY78oyz
Checks for missing Authenticode signature.
resource |
---|
b7847cb24b41f89beb0a9f33d5e659a3_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
FreeLibrary
LoadLibraryA
Sleep
WritePrivateProfileStringA
GetPrivateProfileStringA
GetVersionExA
WideCharToMultiByte
GetTempPathA
CloseHandle
CreateThread
IsBadReadPtr
GetCurrentProcessId
CreateSemaphoreA
GetModuleFileNameA
lstrlenA
HeapFree
GetProcessHeap
VirtualAlloc
VirtualProtect
GetModuleHandleA
GetProcAddress
HeapAlloc
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
MultiByteToWideChar
RtlUnwind
wsprintfA
CharLowerBuffA
InternetOpenA
InternetConnectA
HttpOpenRequestA
HttpSendRequestA
InternetCloseHandle
HttpSendRequestW
?catch4@@YAXKK@Z
DllMain
HookWin32Api
catchxx1
catchxx2
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ