fa
fb
Static task
static1
Behavioral task
behavioral1
Sample
d2bb2b738bc8847367bb3d589bb4d0fb_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d2bb2b738bc8847367bb3d589bb4d0fb_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
d2bb2b738bc8847367bb3d589bb4d0fb_JaffaCakes118
Size
44KB
MD5
d2bb2b738bc8847367bb3d589bb4d0fb
SHA1
124a2ab492153f0810906a9c93c1cccc3c357685
SHA256
31b6bc9a317bbf7bfb81370f501349ec38bba07ab57f45a2ee209a8c1bf93b3b
SHA512
603b6e939b0bed0df653fd59f8d7ec0e51269ce8b636b8ada80e6cf737c038410be0efdf54af352d25e18412edce65f6895dd6feafd6a01b3b512a66f6533122
SSDEEP
768:jlFuSwVSiKTTOLXNktxIFqgFX7Fa1SoU4uu:BkKTT0XNkjIjh5otj
Checks for missing Authenticode signature.
resource |
---|
d2bb2b738bc8847367bb3d589bb4d0fb_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
CreateThread
GetCurrentProcessId
GetCurrentProcess
Thread32Next
CloseHandle
TerminateThread
GetThreadPriority
GetProcAddress
GetModuleHandleA
Thread32First
Sleep
VirtualProtectEx
WriteProcessMemory
ExitProcess
RtlUnwind
CreateToolhelp32Snapshot
GetModuleFileNameA
GetCommandLineA
GetVersion
TerminateProcess
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
GetLastError
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
HeapFree
WriteFile
SetFilePointer
EnterCriticalSection
LeaveCriticalSection
InterlockedDecrement
InterlockedIncrement
InitializeCriticalSection
HeapAlloc
GetCPInfo
GetACP
GetOEMCP
VirtualAlloc
HeapReAlloc
LoadLibraryA
SetStdHandle
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
FlushFileBuffers
CallNextHookEx
SetWindowsHookExA
UnhookWindowsHookEx
FindWindowA
GetWindowTextA
InternetCloseHandle
InternetOpenUrlA
InternetOpenA
InternetReadFile
fa
fb
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ