AR
GetVer
w
Static task
static1
Behavioral task
behavioral1
Sample
c03c67497e17bc2ba142943ddea9c553_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
c03c67497e17bc2ba142943ddea9c553_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
c03c67497e17bc2ba142943ddea9c553_JaffaCakes118
Size
32KB
MD5
c03c67497e17bc2ba142943ddea9c553
SHA1
8d8c2d3de86f5cbab64afb790747ef13c5ac36d1
SHA256
4b1109daef1c421a183d686b0fee5afa1ff7d22f75c174bd46200470cb14a3a2
SHA512
264f09e5a061db0577b487860214af4512ea2d66dd922096b2a64ace41625c1fc43d2460a41585fcc658bf2c26bc8410474bc55f430fc2774765d0042b44acff
SSDEEP
384:2dO/RDqdcHlLKB6aGlPS0OP15walsy4V+9MG:IO/lqdcFeD6OP13aZVi
Checks for missing Authenticode signature.
resource |
---|
c03c67497e17bc2ba142943ddea9c553_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
CreateThread
GetCurrentProcessId
GetModuleFileNameA
GetTempPathA
GetCurrentProcess
Sleep
LoadLibraryA
GetTickCount
GetModuleHandleA
GetProcAddress
lstrcmpiA
GetSystemInfo
GetVersionExA
CloseHandle
GetWindowThreadProcessId
EnumWindows
DispatchMessageA
GetClassNameA
GetWindowTextA
GetWindowTextLengthA
wsprintfA
CharLowerA
CallNextHookEx
SetWindowsHookExA
GetMessageA
TranslateMessage
GetSystemMetrics
RegQueryValueExA
RegOpenKeyExA
RegSetValueExA
RegCreateKeyA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegCloseKey
InternetReadFile
InternetCloseHandle
InternetOpenUrlA
_stricmp
fclose
strstr
malloc
free
??2@YAPAXI@Z
??3@YAXPAX@Z
_except_handler3
sprintf
fopen
_splitpath
_initterm
_adjust_fdiv
fgets
AR
GetVer
w
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ