CancelDll
LoadDll
Static task
static1
Behavioral task
behavioral1
Sample
df768f6fd6ad367668cc694ccb557c02_JaffaCakes118.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
df768f6fd6ad367668cc694ccb557c02_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
df768f6fd6ad367668cc694ccb557c02_JaffaCakes118
Size
98KB
MD5
df768f6fd6ad367668cc694ccb557c02
SHA1
ceeadb67f20aa4052d6559efddeeff794d1cdb79
SHA256
7d3695b0fe5e8a0b8e39331ca16b9a82638c787b4b444ba487bb4622f56070a8
SHA512
b960a04cef8e78b0e288160e4af2a062d223ca0a857448bc95ba5238a6ead79e24501bbb61be1a41bebebe28ab513d670a7437ba5768782c54b000883a02c922
SSDEEP
1536:0LssI6lIZKovOOt1ceIQaltMHrbI1gEtxgyTVhfonj0jDuutWJpM9H7D:pH6lIZSoceIePIpXgihgn4jntqpM9bD
Checks for missing Authenticode signature.
resource |
---|
df768f6fd6ad367668cc694ccb557c02_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
time
srand
rand
_vsnprintf
tolower
strrchr
_except_handler3
malloc
strncpy
free
atoi
__CxxFrameHandler
??2@YAPAXI@Z
??3@YAXPAX@Z
memcpy
strlen
sprintf
memset
_strcmpi
lstrlenA
MultiByteToWideChar
CreateToolhelp32Snapshot
Thread32First
GetCurrentProcessId
OpenThread
GetThreadContext
SetThreadContext
Thread32Next
EnterCriticalSection
LeaveCriticalSection
IsBadReadPtr
HeapAlloc
GetProcessHeap
Sleep
LoadLibraryA
GetComputerNameA
CloseHandle
GetFileSize
ReadFile
SetFilePointer
GetProcAddress
GetModuleHandleA
AddVectoredExceptionHandler
VirtualProtect
FlushInstructionCache
GetCurrentProcess
InitializeCriticalSection
UnhookWindowsHookEx
SetWindowsHookExA
CallNextHookEx
wsprintfA
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
CancelDll
LoadDll
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE