FuckYourMM
GetHide
Nod32
Rising
ServiceMain
XServiceMainX
XsvchostSvchostX
XsvchostdllX
kav
Static task
static1
Behavioral task
behavioral1
Sample
dbdbcc44bdf2f621f60427604b473b20_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dbdbcc44bdf2f621f60427604b473b20_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
dbdbcc44bdf2f621f60427604b473b20_JaffaCakes118
Size
493KB
MD5
dbdbcc44bdf2f621f60427604b473b20
SHA1
1ffc52d94be7bcc4c98021b65d0c03668e7a29bb
SHA256
452baf51883cded9315e7bbcd5da73b8b8e62164a71709f4e912b0cb8d2f94fc
SHA512
07d2dd0b62d0e2c734e76fc80245f64ce21ebf1edb8bc0c1f341790d7762bed74b258f662082f7e17a5713d72a8930c57a8764a6fa9930cd224a2cd4068a8ba2
SSDEEP
12288:QOqUPEUjKvOHadPn4fkNjPQJ3mMmPpGUHUnzGpbOofbI:QKjKvOH2v4fkNUJWpB0zGlOos
Checks for missing Authenticode signature.
resource |
---|
dbdbcc44bdf2f621f60427604b473b20_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetProcessHeap
LoadLibraryA
VirtualProtect
GetModuleFileNameA
ExitProcess
SetCapture
MessageBoxA
DeleteDC
LsaRetrievePrivateData
SHGetSpecialFolderPathA
SHDeleteKeyA
_adjust_fdiv
waveOutClose
gethostname
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
ImmReleaseContext
InternetOpenA
capGetDriverDescriptionA
ICSeqCompressFrame
EnumProcessModules
WTSFreeMemory
FuckYourMM
GetHide
Nod32
Rising
ServiceMain
XServiceMainX
XsvchostSvchostX
XsvchostdllX
kav
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ