x
y
z
Static task
static1
Behavioral task
behavioral1
Sample
b770f7e1c89cba6510fbe6a7f32a2c7b_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b770f7e1c89cba6510fbe6a7f32a2c7b_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
b770f7e1c89cba6510fbe6a7f32a2c7b_JaffaCakes118
Size
24KB
MD5
b770f7e1c89cba6510fbe6a7f32a2c7b
SHA1
9a29f9c208fb58edeb37cc63444ebdee13c019bf
SHA256
751bc399c1269188884f4d30e1e55d5506c3704e733319358fdc20496c5bd96d
SHA512
7b7da44d4b7627f79580c2ce19e2c4d6d43e3b11567a05a8eb940d3dbb5267aecc5c060b3dae4bd07734c8d574d050637f0f112b4b2670b04b62734b1dd23e95
SSDEEP
384:PBfvftdWc18LPnOILfN27OqIK2J1zVTcUqHxMSp7BlKjy2z+EMEExCJMA6maC4SH:PdftdW88TzKC1zFcUqHpp7DEMEqCJMm
Checks for missing Authenticode signature.
resource |
---|
b770f7e1c89cba6510fbe6a7f32a2c7b_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetTempPathA
GetProcAddress
GetModuleHandleA
MulDiv
GetTickCount
CloseHandle
WriteFile
ReadFile
CreateFileA
WaitForMultipleObjects
WaitForSingleObject
DeleteFileA
CreateEventA
lstrcmpA
GetTempFileNameA
lstrcatA
GetModuleFileNameA
InterlockedExchange
RtlUnwind
HeapReAlloc
HeapFree
GetProcessHeap
HeapAlloc
GetFileAttributesW
GetFileAttributesA
SetFileAttributesA
lstrlenA
CreateProcessA
VirtualQuery
GetLastError
WinExec
GlobalAlloc
lstrcpynA
lstrcpyA
SetFilePointer
GlobalFree
wsprintfA
CallWindowProcA
DestroyWindow
EnableWindow
GetWindowLongA
CreateWindowExA
SetWindowLongA
SetDlgItemTextA
MessageBoxA
SetWindowTextA
SendMessageA
GetDlgItem
GetFocus
IsWindowVisible
RegisterWindowMessageA
CharLowerBuffA
ShowWindow
GetClientRect
GetWindowRect
RegSetValueExA
RegOpenKeyA
RegQueryValueExA
RegCloseKey
RegEnumValueA
RegOpenKeyExA
InternetSetFilePointer
InternetConnectA
HttpOpenRequestA
InternetCrackUrlA
FindCloseUrlCache
FindFirstUrlCacheEntryA
InternetReadFile
InternetCloseHandle
InternetOpenA
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
x
y
z
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.