x
y
z
Static task
static1
Behavioral task
behavioral1
Sample
c23ec575ecd72ab6742894a3721c2eeb_JaffaCakes118.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
c23ec575ecd72ab6742894a3721c2eeb_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
c23ec575ecd72ab6742894a3721c2eeb_JaffaCakes118
Size
31KB
MD5
c23ec575ecd72ab6742894a3721c2eeb
SHA1
270f3ec3fcbc532f4ab6c99bb791f16a42bbffda
SHA256
09225f8dc8965f4c2fe5af472cff741c708200139a6bd423e1e0d75835f19943
SHA512
f729c1d05dd83b987dc0a0e8b79cb18271fd92c3c94c66f3583d3c208e4048b56e534c3c2cb4edbd7efbd98151d4a17690820cf3834b0c07bf97eb104ebb3967
SSDEEP
384:1ERrauyjid/897rWCqnlEwgKTjoM+R78DW46JBvBOBNXQi:azS5rfgH+R78646JB52Ci
Checks for missing Authenticode signature.
resource |
---|
c23ec575ecd72ab6742894a3721c2eeb_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetProcAddress
GetModuleHandleA
lstrcatA
MulDiv
GetTickCount
CloseHandle
WriteFile
CreateFileA
WaitForMultipleObjects
WaitForSingleObject
DeleteFileA
CreateEventA
SetFilePointer
OutputDebugStringA
GetTempPathA
InterlockedExchange
RtlUnwind
GetTempFileNameA
HeapReAlloc
HeapFree
GetProcessHeap
HeapAlloc
OpenEventW
ReadFile
lstrlenA
CreateProcessA
GetLastError
VirtualQuery
FindNextFileW
GetCommandLineW
GlobalAlloc
lstrcpynA
lstrcpyA
GetModuleFileNameA
GlobalFree
PeekMessageW
ShowWindowAsync
CallWindowProcA
DestroyWindow
EnableWindow
GetWindowLongA
SetWindowLongA
SetDlgItemTextA
MessageBoxA
wsprintfA
SetWindowTextA
SendMessageA
GetDlgItem
GetFocus
IsWindowVisible
ShowWindow
RegisterWindowMessageA
CharLowerBuffA
GetClientRect
GetWindowRect
CreateWindowExA
RegQueryValueExA
RegCloseKey
RegOpenKeyW
RegOpenKeyA
RegCreateKeyW
RegEnumValueA
RegOpenKeyExA
InternetCloseHandle
InternetReadFile
InternetSetFilePointer
InternetCrackUrlA
FindCloseUrlCache
FindFirstUrlCacheEntryA
InternetOpenA
InternetConnectA
HttpOpenRequestA
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
x
y
z
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ