ppp
qqq
Static task
static1
Behavioral task
behavioral1
Sample
d0e57e37dd75e58e93da41db6515408c_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d0e57e37dd75e58e93da41db6515408c_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
d0e57e37dd75e58e93da41db6515408c_JaffaCakes118
Size
96KB
MD5
d0e57e37dd75e58e93da41db6515408c
SHA1
7e6ed7325f5620956c2895f38ec434565830d85f
SHA256
935c194cec8e5e4e6b4172aa889c56f90f3ef8bb7928db627bc9d27346b23d0f
SHA512
f0a8b548fee6951c94e640bb97326fe888d1bc47d783864519d2defe38a2438c35db5b72d8de14fdbf949342e2cf57f0d03d28a55b543c624edf1832856122c1
SSDEEP
768:F1pZNMuSuPcHLXj8hrfQOlBDLFkc3uTg1:F1pbMuSaqjj8BnllLFkK
Checks for missing Authenticode signature.
resource |
---|
d0e57e37dd75e58e93da41db6515408c_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetTickCount
WideCharToMultiByte
MultiByteToWideChar
TerminateProcess
ReadProcessMemory
CreateProcessA
GetModuleFileNameA
VirtualAlloc
GetProcAddress
LoadLibraryA
ExitProcess
CloseHandle
CreateFileA
GetSystemDirectoryA
GetCurrentThreadId
GetCurrentProcess
ReadFile
SetFilePointer
GetCurrentProcessId
VirtualProtectEx
SetUnhandledExceptionFilter
SetThreadContext
OpenThread
WriteProcessMemory
CreateMutexA
GetLastError
GetModuleHandleA
GetPrivateProfileStringA
Sleep
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
GetCommandLineA
IsBadReadPtr
TerminateThread
CreateThread
UnhookWindowsHookEx
GetWindowTextA
CallNextHookEx
SetWindowsHookExA
GetWindowThreadProcessId
GetForegroundWindow
InternetCloseHandle
InternetReadFile
_initterm
malloc
_adjust_fdiv
_stricmp
_strlwr
_strcmpi
free
strcmp
strcat
sprintf
??2@YAPAXI@Z
memcpy
strrchr
memset
strlen
strcpy
rand
srand
??3@YAXPAX@Z
strncpy
strchr
strstr
fclose
fread
fopen
ppp
qqq
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ