hhh
iii
Static task
static1
Behavioral task
behavioral1
Sample
c014bee0c109b16d22ae52b4a85df3ef_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c014bee0c109b16d22ae52b4a85df3ef_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
c014bee0c109b16d22ae52b4a85df3ef_JaffaCakes118
Size
28KB
MD5
c014bee0c109b16d22ae52b4a85df3ef
SHA1
09c7d38db227d7959538d5d2c0724025cb721879
SHA256
630b9203cf78f87a6fbb271a4c2e8629cef17c3552f0c2013832070977678c6e
SHA512
06201e093db57213dd8fbea72992983c9184dacbef99b356bb0a66360d343d48beffc926a5013faa2aeef878d874495bdd40d51c91140a05a9bf02d56d2a9dd1
SSDEEP
768:QsiQwDgSL/ABhpvptcArlnEIJEZ8rcRL2:QsiQyIpcHIJERL2
Checks for missing Authenticode signature.
resource |
---|
c014bee0c109b16d22ae52b4a85df3ef_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetModuleFileNameA
GetLastError
CreateMutexA
GetCurrentProcessId
GetPrivateProfileStringA
GetModuleHandleA
ReadProcessMemory
SetUnhandledExceptionFilter
SetThreadContext
OpenThread
GetProcAddress
WideCharToMultiByte
MultiByteToWideChar
TerminateProcess
CreateProcessA
VirtualAlloc
LoadLibraryA
ExitProcess
GetSystemDirectoryA
CreateFileA
GetCurrentProcess
WriteFile
DeleteFileA
InitializeCriticalSection
VirtualProtectEx
VirtualProtect
LeaveCriticalSection
EnterCriticalSection
SetFilePointer
ReadFile
CloseHandle
Sleep
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
GetCommandLineA
IsBadReadPtr
TerminateThread
CreateThread
GetCurrentThreadId
GetForegroundWindow
GetWindowTextA
GetWindowThreadProcessId
SetWindowsHookExA
UnhookWindowsHookEx
CallNextHookEx
FindWindowA
InternetCloseHandle
InternetReadFile
wcslen
_stricmp
_strupr
_strlwr
_strcmpi
_strnicmp
strcmp
fopen
fread
fclose
sprintf
??2@YAPAXI@Z
memcpy
strrchr
memset
strcat
strcpy
strlen
atoi
??3@YAXPAX@Z
strncpy
strchr
strstr
hhh
iii
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ