Call
_DllMain@12
Static task
static1
Behavioral task
behavioral1
Sample
cfabb5e676dd38b5bbe19e720a5db4a4_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cfabb5e676dd38b5bbe19e720a5db4a4_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
cfabb5e676dd38b5bbe19e720a5db4a4_JaffaCakes118
Size
31KB
MD5
cfabb5e676dd38b5bbe19e720a5db4a4
SHA1
28a3f926458c2f003b146fd33d2fbb0c53442db6
SHA256
83de341ae6882b089f725cbf334ed0ba76d7280be17c1b7f8a94617ce49836d1
SHA512
04f7b7b5152915d6aacd930c1590301aea9d3ab971954cfe73d15e1870613581df9879e895ce8dad60b5a25412808640d48ddbd4086578b6525336ccc9f87a52
SSDEEP
768:yn/TtAz77zCM+U0ItYQl63tOeopA/oxyB:y/TtAnCy3KopA/ocB
Checks for missing Authenticode signature.
resource |
---|
cfabb5e676dd38b5bbe19e720a5db4a4_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetStringTypeW
GetStringTypeA
LCMapStringW
WriteFile
CreateSemaphoreA
IsBadReadPtr
CreateThread
Sleep
GetProcessHeap
HeapAlloc
HeapFree
LCMapStringA
MultiByteToWideChar
LoadLibraryA
GetProcAddress
GetOEMCP
HeapReAlloc
RtlUnwind
ExitProcess
TerminateProcess
GetCurrentProcess
GetModuleFileNameA
VirtualFree
VirtualAlloc
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
WideCharToMultiByte
GetStdHandle
GetCPInfo
GetACP
SendMessageA
FindWindowA
FindWindowExA
wsprintfA
HttpOpenRequestA
InternetConnectA
InternetOpenA
InternetCloseHandle
HttpSendRequestA
Call
_DllMain@12
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ