GetName
_GetName@16
Static task
static1
Behavioral task
behavioral1
Sample
cf02da30b38a1a6c4e3c32cad3c8a992_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
cf02da30b38a1a6c4e3c32cad3c8a992_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
cf02da30b38a1a6c4e3c32cad3c8a992_JaffaCakes118
Size
62KB
MD5
cf02da30b38a1a6c4e3c32cad3c8a992
SHA1
a8b0e6f13e2619d27b5628fcaf98edc078417120
SHA256
cc08d37cde43f877263bd8d34ec8245be60d2adf9f2a4cabdd1b3293cc5b7190
SHA512
fdc05a7259e88d77e88f4cff8177f003a8c0c7e231c4033e7ffdadaac9bb00ced19dc1fcd8e0d446817b4a64c000bbdcf14c7b8c6df6825ef4c423e1a8dad33d
SSDEEP
384:ZoCYRs7EroL2CJfiwvfZp+KVbnBB4UtbfPdUN4fMxMpdDewrcb1A:7YR9rBHwJBdFtqN4UxMpdDYy
Checks for missing Authenticode signature.
resource |
---|
cf02da30b38a1a6c4e3c32cad3c8a992_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
lstrlenW
ReleaseMutex
GetLastError
VirtualFreeEx
VirtualAllocEx
lstrcmpiA
FindClose
FindNextFileA
lstrcatA
CloseHandle
GetCurrentProcess
Module32First
VirtualProtectEx
GetModuleHandleA
ReadFile
GetFileSize
WideCharToMultiByte
GetPrivateProfileStringA
CreateMutexA
DeleteFileA
GetModuleFileNameA
CopyFileA
TerminateProcess
GlobalFree
GlobalUnlock
DisableThreadLibraryCalls
MultiByteToWideChar
CreateFileA
GetTempPathA
GetCurrentProcessId
GetTickCount
WaitForSingleObject
Sleep
LoadLibraryA
GetProcAddress
WinExec
lstrlenA
lstrcpyA
GetWindowRect
GetForegroundWindow
GetWindowThreadProcessId
wsprintfA
OpenDesktopA
SetProcessWindowStation
OpenWindowStationA
ReleaseDC
GetDC
SetThreadDesktop
GetNearestPaletteIndex
GetPaletteEntries
DeleteObject
CreateHalftonePalette
SetSecurityDescriptorDacl
LookupPrivilegeValueA
OpenProcessToken
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ID@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
StrRStrIA
strchr
strlen
strncat
_splitpath
_purecall
free
__dllonexit
_onexit
sscanf
??2@YAPAXI@Z
atoi
memset
strcmp
strcpy
_beginthreadex
__CxxFrameHandler
strstr
_itoa
memcpy
fclose
fputc
fwrite
fopen
fflush
MakeSureDirectoryPathExists
WSAStartup
gethostbyname
getpeername
GetName
_GetName@16
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ