fa
fc
Static task
static1
Behavioral task
behavioral1
Sample
d70e312523a21e338d11ed56a067f695_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d70e312523a21e338d11ed56a067f695_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
d70e312523a21e338d11ed56a067f695_JaffaCakes118
Size
7KB
MD5
d70e312523a21e338d11ed56a067f695
SHA1
f9e4755c374b28ae90986f9c2fc6685030f989c3
SHA256
65e4da89d4976d5213dd138cba957efba8829793679092269c0314b49e2b15f4
SHA512
e1495deaa167f0ae9e6fc9ea343fa8ef429a81649d8882a3befead567f0dec7aaab897d60d53f9a9d3c775b19bf51c8a325e7db701b9201e203d639b61ce915e
SSDEEP
96:RjhWNhGKdJaw6xTqMr8QsU2LSfPfiPqb//rzhGafkN9f:R+h5dwNhsCQSTNRC
Checks for missing Authenticode signature.
resource |
---|
d70e312523a21e338d11ed56a067f695_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
CreateThread
Sleep
VirtualProtectEx
MultiByteToWideChar
ReadProcessMemory
GlobalLock
GlobalAlloc
IsBadReadPtr
WideCharToMultiByte
GetCurrentProcess
GlobalFree
GetModuleFileNameA
SetWindowsHookExA
UnhookWindowsHookEx
CallNextHookEx
InternetReadFile
InternetCloseHandle
InternetOpenUrlA
InternetOpenA
_adjust_fdiv
malloc
_initterm
free
_stricmp
strcmp
strrchr
??3@YAXPAX@Z
strcpy
??2@YAPAXI@Z
sprintf
strlen
strncpy
strchr
strstr
fclose
fread
fopen
memset
memcpy
fa
fc
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ