hhh
iii
jklp
Static task
static1
Behavioral task
behavioral1
Sample
bd601e366547ee2a32fbdd44427b4941_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
bd601e366547ee2a32fbdd44427b4941_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
bd601e366547ee2a32fbdd44427b4941_JaffaCakes118
Size
40KB
MD5
bd601e366547ee2a32fbdd44427b4941
SHA1
185a941b122a8f6cc703cc5878f346b87e2b77fc
SHA256
948b22efd55b867d90d8d4cc280a9919a761570540cd18795c8883cd0e69533c
SHA512
be8acf7ae99fa188f743abc864aba3b3ee1ec35dbb926fc52276cef08678e5540aff53c546d993dbb3b64f8abcbf1173efe9e7764cd34b4abb13716ebd123624
SSDEEP
768:2NfyaDT/5HK8Zax4i6BiNRrwlbZCBnL+x+sZj:2NfjNHQSi6BXbZeKZj
Checks for missing Authenticode signature.
resource |
---|
bd601e366547ee2a32fbdd44427b4941_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
CreateFileA
GetModuleFileNameA
GetLastError
CreateMutexA
GetCurrentProcessId
GetPrivateProfileStringA
ReadProcessMemory
SetUnhandledExceptionFilter
SetThreadContext
OpenThread
WideCharToMultiByte
MultiByteToWideChar
TerminateProcess
CreateProcessA
VirtualAlloc
ReadFile
ExitProcess
GetCurrentThreadId
GetCurrentProcess
WriteFile
DeleteFileA
VirtualProtectEx
VirtualProtect
CloseHandle
Sleep
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
GetCommandLineA
IsBadReadPtr
TerminateThread
CreateThread
GetModuleHandleA
LoadLibraryA
GetProcAddress
CallNextHookEx
GetWindowThreadProcessId
GetWindowTextA
_strupr
_stricmp
_strlwr
_strcmpi
_strnicmp
sprintf
??2@YAPAXI@Z
memcpy
strrchr
memset
strcat
strcpy
strlen
??3@YAXPAX@Z
strncpy
strchr
strstr
strcmp
__CxxFrameHandler
wcslen
hhh
iii
jklp
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ