CancelDll
LoadDll
Static task
static1
Behavioral task
behavioral1
Sample
c1db131f75a055164d86a9d9b614c276_JaffaCakes118.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
c1db131f75a055164d86a9d9b614c276_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
c1db131f75a055164d86a9d9b614c276_JaffaCakes118
Size
84KB
MD5
c1db131f75a055164d86a9d9b614c276
SHA1
63cd63fc1125b0f26196a465f0010fbd9e4eb152
SHA256
2fbd2d189044ecc3b7168cc643690fccde73b11c3578d84c159c2bdada676233
SHA512
413a39e51b238ed289a3b026aa8c2c6528ffa6c79782a4e8344240882f18701653968d6e8a7488abdce79defe0d6ad3c8193b249bfa1ec951c6895f4a779166c
SSDEEP
1536:HQFqaknOzaRIrcB1tv0zIVIu6V+zBGDTt9H6ximpZ6:HT6aRIrRzIVIlVuwDTt9aQQk
Checks for missing Authenticode signature.
resource |
---|
c1db131f75a055164d86a9d9b614c276_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
memset
_vsnprintf
tolower
_except_handler3
memcpy
malloc
exit
strrchr
wcsstr
wcscpy
wcsncat
strstr
time
srand
rand
strcat
wcslen
strcmp
strncpy
free
_stricmp
strlen
mbstowcs
fopen
fseek
ftell
fclose
??2@YAPAXI@Z
wcscmp
??3@YAXPAX@Z
strcpy
sprintf
_strupr
_strcmpi
CreateDCA
GetDeviceCaps
CreateCompatibleDC
CreateCompatibleBitmap
SelectObject
BitBlt
DeleteObject
DeleteDC
SetFilePointer
CloseHandle
GetFileSize
ReadFile
WideCharToMultiByte
GetFileAttributesW
GetTempPathA
DeleteFileA
GetModuleFileNameA
GetPrivateProfileStringA
OpenProcess
HeapAlloc
GetProcessHeap
MultiByteToWideChar
lstrlenA
Sleep
GetModuleHandleA
FreeLibrary
LoadLibraryA
GetCurrentProcess
TerminateProcess
wsprintfA
GetWindow
GetClassNameW
CallNextHookEx
SetWindowsHookExA
UnhookWindowsHookEx
GetDC
GetWindowRect
CancelDll
LoadDll
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE