ggg
hhh
Static task
static1
Behavioral task
behavioral1
Sample
c1ba4ae2dc402e93b58078f31f7c0f4f_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c1ba4ae2dc402e93b58078f31f7c0f4f_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
c1ba4ae2dc402e93b58078f31f7c0f4f_JaffaCakes118
Size
25KB
MD5
c1ba4ae2dc402e93b58078f31f7c0f4f
SHA1
f9a4bf7f63c2c8a91a97aa3ba7e4ef87e405d084
SHA256
2370d99bd713d7b5cc7b383a00f6715a26a2627fe9e16e52523b73d23729c7a2
SHA512
92e16c91366c9722bdbe5e077b752fbd033811b65f16097ff7a2ef026e221430f7643680f36de7b180020384182241dda4d484f31e3f549d8d3282d8782a2518
SSDEEP
768:Tx8yyGDF/FPuooEBKwbCt4GhyCsZ8Seza:F8yywOooOjC9za
Checks for missing Authenticode signature.
resource |
---|
c1ba4ae2dc402e93b58078f31f7c0f4f_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetModuleFileNameA
GetLastError
CreateMutexA
GetCurrentProcessId
GetPrivateProfileStringA
GetModuleHandleA
ReadProcessMemory
SetUnhandledExceptionFilter
SetThreadContext
OpenThread
GetProcAddress
WideCharToMultiByte
MultiByteToWideChar
TerminateProcess
CreateProcessA
VirtualAlloc
LoadLibraryA
ExitProcess
GetSystemDirectoryA
CreateFileA
GetCurrentProcess
WriteFile
DeleteFileA
InitializeCriticalSection
VirtualProtectEx
VirtualProtect
LeaveCriticalSection
EnterCriticalSection
SetFilePointer
ReadFile
CloseHandle
Sleep
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
GetCommandLineA
IsBadReadPtr
TerminateThread
CreateThread
GetCurrentThreadId
SetWindowsHookExA
UnhookWindowsHookEx
FindWindowA
CallNextHookEx
GetWindowTextA
GetWindowThreadProcessId
GetForegroundWindow
strcmp
wcslen
_stricmp
_strupr
_strlwr
_strcmpi
fopen
sprintf
??2@YAPAXI@Z
memcpy
strrchr
memset
strcat
strcpy
strlen
??3@YAXPAX@Z
strncpy
strchr
strstr
fclose
fread
ggg
hhh
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ