a
b
Static task
static1
Behavioral task
behavioral1
Sample
c243930c48e9d9c13687d45fd15b90d2_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c243930c48e9d9c13687d45fd15b90d2_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
c243930c48e9d9c13687d45fd15b90d2_JaffaCakes118
Size
97KB
MD5
c243930c48e9d9c13687d45fd15b90d2
SHA1
d2567466962fced751d7b6f01d8603873ec48a6f
SHA256
5695c468e42b7231ad727a6f9d645a910cab9acc5b40ff4d5c5c1241be3931a3
SHA512
bd14f38f1e417f4b456edca78fcb392978e724b772486baa63b65b84d55227abceabce1b665edea4d5804ccc2da24c35305b988693f39ea158a552c200155fda
SSDEEP
768:KnKl2XOz3sCu+/h29vOYXOhYFtDJOgpg5Rd5WTXhG2yg0rvLp8N:KnKl2oOOYXTFtTCh5ik2y3jp8N
Checks for missing Authenticode signature.
resource |
---|
c243930c48e9d9c13687d45fd15b90d2_JaffaCakes118 |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PathFileExistsA
StrStrIW
SetEvent
WriteFile
OpenProcess
GetVolumeInformationA
Sleep
SizeofResource
CreateEventA
GetSystemDirectoryA
CreateFileW
GetLastError
DisableThreadLibraryCalls
LoadResource
CreateFileMappingA
MoveFileA
LockResource
Process32NextW
CreateMutexA
CreateToolhelp32Snapshot
CloseHandle
GetWindowsDirectoryW
HeapSize
FindResourceW
UnmapViewOfFile
MapViewOfFile
Process32FirstW
TlsGetValue
RtlUnwind
InitializeCriticalSectionAndSpinCount
GetCurrentThreadId
GetCommandLineA
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
GetModuleHandleW
GetProcAddress
TlsAlloc
TlsSetValue
TlsFree
SetLastError
LCMapStringA
WideCharToMultiByte
MultiByteToWideChar
LCMapStringW
HeapFree
ExitProcess
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapCreate
HeapDestroy
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetStringTypeA
GetStringTypeW
LeaveCriticalSection
EnterCriticalSection
GetLocaleInfoA
HeapAlloc
VirtualAlloc
HeapReAlloc
LoadLibraryA
CharLowerA
wsprintfA
ImpersonateLoggedOnUser
RegCreateKeyExA
CreateProcessAsUserW
RegQueryValueExA
OpenProcessToken
RegCloseKey
ShellExecuteW
a
b
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ