bypass
entry
Static task
static1
Behavioral task
behavioral1
Sample
dd2b76102c95ab927020412f3c871bb8_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dd2b76102c95ab927020412f3c871bb8_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
dd2b76102c95ab927020412f3c871bb8_JaffaCakes118
Size
19KB
MD5
dd2b76102c95ab927020412f3c871bb8
SHA1
192c682accf36b228afe9c53789d5adcf3c37c29
SHA256
8fc22fe65b716e5418c0b43f8c6512dacb1d1bac3a2fed6f2831e74a885ded42
SHA512
5d7eb3a601854b2124dac05eaf4bbd09b2e230e7ba57c78a109ef2c1ede0990d3de40e99cf58b2b50fdbcb94aa2a9f4c2a876046ea5149fc6dc8584b7bb027cc
SSDEEP
384:zcTTpjz8EZ+cAxwPfM1OzGs+9yZRnwXZ755:zsl38ENow3KszDnwpr
Checks for missing Authenticode signature.
resource |
---|
dd2b76102c95ab927020412f3c871bb8_JaffaCakes118 |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
CreateFileA
lstrlenA
PeekNamedPipe
MoveFileExA
SetErrorMode
FreeLibrary
HeapAlloc
MoveFileExW
HeapFree
WaitForSingleObject
SetEvent
ConnectNamedPipe
GetTickCount
VirtualFree
GetProcessHeap
IsBadReadPtr
WriteFile
InitializeCriticalSection
GlobalAlloc
LoadLibraryW
TerminateThread
Sleep
CreateEventA
LeaveCriticalSection
ReadFile
lstrcatA
DisconnectNamedPipe
GetProcAddress
VirtualAlloc
CreateNamedPipeA
EnterCriticalSection
SetFileAttributesA
GlobalFree
ResetEvent
LoadLibraryA
OpenEventA
GetModuleFileNameA
GetModuleHandleA
VirtualProtect
GetVersionExA
CloseHandle
GlobalReAlloc
CreateThread
lstrcpyA
_stricmp
_wcsicmp
sprintf
free
strstr
strchr
strrchr
wcstombs
realloc
_initterm
malloc
_adjust_fdiv
memset
memcpy
_except_handler3
GetActiveWindow
ShellExecuteExA
bypass
entry
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ