kkk
lll
Static task
static1
Behavioral task
behavioral1
Sample
ea57adf9206cfd1ec8062704e547ba73_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea57adf9206cfd1ec8062704e547ba73_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
ea57adf9206cfd1ec8062704e547ba73_JaffaCakes118
Size
26KB
MD5
ea57adf9206cfd1ec8062704e547ba73
SHA1
41616219d56fc638c8257df2d9ce6e3a746e974f
SHA256
7c4670a797e9b7ac7874e895e8fb0c780a5f3ae88357a1f229c64eb828446575
SHA512
d4b3eecea473349b2634fe036e8a8a66e7325b54c72964d1c06ab3b4ca3e83cfb922e41cd7e2cb604835eaeaff05ed2ebb5f8f9ad27d70984d44563400ca9191
SSDEEP
384:cDYnLC/0r5r0Uom6hqOGhUaoLDCa+aNpdmC86plcszSzPgWanBWkgsfJ:tnLCTnhq9hUauDCD4d186FgPeBKsB
Checks for missing Authenticode signature.
resource |
---|
ea57adf9206cfd1ec8062704e547ba73_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetLastError
CreateMutexA
GetCurrentProcessId
CreateThread
VirtualAlloc
ReadProcessMemory
GlobalLock
GlobalAlloc
CreateProcessA
GetModuleFileNameA
GetPrivateProfileStringA
WideCharToMultiByte
MultiByteToWideChar
GlobalFree
GlobalUnlock
IsBadReadPtr
InitializeCriticalSection
VirtualProtectEx
LeaveCriticalSection
EnterCriticalSection
LoadLibraryA
SetThreadContext
OpenThread
SetUnhandledExceptionFilter
GetCommandLineA
GetCurrentThreadId
ReadFile
DeleteFileA
GetTempPathA
CreateFileA
WriteFile
CloseHandle
VirtualProtect
GetCurrentProcess
TerminateProcess
TerminateThread
Sleep
GetModuleHandleA
ExitProcess
GetProcAddress
CallNextHookEx
GetWindowTextA
GetWindowThreadProcessId
_strupr
_stricmp
_strcmpi
_strlwr
strcpy
sprintf
strlen
memcpy
strcat
memset
??2@YAPAXI@Z
atoi
??3@YAXPAX@Z
strstr
strncpy
strchr
fclose
fread
fopen
strcmp
wcslen
strrchr
__CxxFrameHandler
kkk
lll
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ