_king@16
king
Static task
static1
Behavioral task
behavioral1
Sample
cefbfebf1453646b522ee5263c76b355_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cefbfebf1453646b522ee5263c76b355_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
cefbfebf1453646b522ee5263c76b355_JaffaCakes118
Size
48KB
MD5
cefbfebf1453646b522ee5263c76b355
SHA1
689a95865d1581f1e5249a3cfd6ca764457023dd
SHA256
7db3dc60776661e3721216183a250ac8d6d1b047d6122dfaf841769152492e1f
SHA512
e7dcd4225e0f4ccc6d72c81322ac173057ac91953de39e8c008a8cba5d87219b8ef67cb31f512a5f76f5eb011a5728bbbe79eb6ef5b917c7a66d93b10ba269d5
SSDEEP
384:kWfFK4sWrMGbv1fZz+adUPIJdq8lpi5u77GNlsXv/08mJHniAFN+:kW0Nc9fZzxvJW5u/GnsXa5niAC
Checks for missing Authenticode signature.
resource |
---|
cefbfebf1453646b522ee5263c76b355_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
MultiByteToWideChar
WideCharToMultiByte
lstrlenW
ReleaseMutex
GetLastError
VirtualFreeEx
WriteProcessMemory
VirtualAllocEx
lstrcmpiA
FindClose
FindNextFileA
FindFirstFileA
lstrcatA
CloseHandle
GetCurrentProcess
Module32First
VirtualProtectEx
GetModuleHandleA
GetFileSize
GetModuleFileNameA
TerminateProcess
GlobalFree
GlobalUnlock
DeleteFileA
DisableThreadLibraryCalls
IsBadReadPtr
GetCurrentProcessId
WaitForSingleObject
GetWindowsDirectoryA
Sleep
CreateMutexA
LoadLibraryA
GetProcAddress
lstrcpyA
CreateFileA
GetTickCount
ReadFile
lstrlenA
GetClientRect
GetDC
ReleaseDC
GetDesktopWindow
EnumWindows
GetWindowThreadProcessId
wsprintfA
CreateHalftonePalette
GetPaletteEntries
DeleteObject
GetNearestPaletteIndex
GetPixel
OpenProcessToken
LookupPrivilegeValueA
strcat
strrchr
rand
srand
free
__dllonexit
_onexit
_itoa
_purecall
strcmp
atoi
memset
memcpy
strcpy
_beginthreadex
__CxxFrameHandler
fclose
fputc
fwrite
fopen
fflush
??2@YAPAXI@Z
strncat
strstr
_king@16
king
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ