eee
fff
Static task
static1
Behavioral task
behavioral1
Sample
dd820dc84365b91e0e9da2b05210792f_JaffaCakes118.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
dd820dc84365b91e0e9da2b05210792f_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
dd820dc84365b91e0e9da2b05210792f_JaffaCakes118
Size
26KB
MD5
dd820dc84365b91e0e9da2b05210792f
SHA1
4a0e3795e0efa6e4f71185223a8a197f586b34cd
SHA256
5a824b97d2f71a84b78b9662852a5521721cf97d78f4ff9f86e4604f928875d7
SHA512
e945a01066e2e145008a1406cf3d26a02da9b918ff8644c2bd4a8a74775772e997f52c6b1b44a1359b6c0fbbff72e347fe526121cc976c640cef0e30327ace02
SSDEEP
384:oCgVlE+h+YnUUU42d6OKOMsnJMqUR7/DPQDsSeOlLfwftJ18WByRtyCo0:ohV2rYUUQd61snJMqU9/D45eVIRtyCf
Checks for missing Authenticode signature.
resource |
---|
dd820dc84365b91e0e9da2b05210792f_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetComputerNameA
ExitProcess
CloseHandle
ReadFile
SetFilePointer
CreateFileA
GetModuleFileNameA
WriteFile
DeleteFileA
InitializeCriticalSection
GetModuleHandleA
VirtualProtectEx
VirtualProtect
GetPrivateProfileStringA
WideCharToMultiByte
LeaveCriticalSection
EnterCriticalSection
GetProcAddress
LoadLibraryA
SetThreadContext
OpenThread
MultiByteToWideChar
TerminateProcess
CreateProcessA
VirtualAlloc
GetSystemDirectoryA
GetCurrentThreadId
GetCurrentProcess
ReadProcessMemory
GetCurrentProcessId
CreateMutexA
GetLastError
Sleep
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
GetCommandLineA
IsBadReadPtr
TerminateThread
SetUnhandledExceptionFilter
CreateThread
UnhookWindowsHookEx
SetWindowsHookExA
GetForegroundWindow
FindWindowA
GetDesktopWindow
GetWindow
CallNextHookEx
GetClassNameA
GetWindowTextA
GetWindowThreadProcessId
fclose
fread
fopen
_stricmp
_strcmpi
_strupr
_strlwr
??3@YAXPAX@Z
??2@YAPAXI@Z
memcpy
strrchr
memset
strcat
sprintf
strcpy
strlen
strncpy
strstr
strchr
strcmp
wcslen
eee
fff
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ