fx
kkk
Static task
static1
Behavioral task
behavioral1
Sample
ea79788375ea2f550abf7864fef6b573_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea79788375ea2f550abf7864fef6b573_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
ea79788375ea2f550abf7864fef6b573_JaffaCakes118
Size
27KB
MD5
ea79788375ea2f550abf7864fef6b573
SHA1
56ba6a4ea7eb5b6e5ae1574423231d63230e21df
SHA256
6a36aafff421081a0125a90e60d41bb7f73a6624ee0137f07822a04d6bf1f23b
SHA512
da2f576e69d20870e658602f3b3da1eb0df8429328e803e6abaca8aa6a5510d25289891655ef75fbc8115941c5215bd1173057dbab768115ee703911d670e397
SSDEEP
768:AEur0gs8Dny/HxkAAYsXVGliZ5NTB/1KZu:urRFyxkAA5aEtKZu
Checks for missing Authenticode signature.
resource |
---|
ea79788375ea2f550abf7864fef6b573_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
CloseHandle
ReadFile
CreateFileA
GetModuleFileNameA
GetLastError
CreateMutexA
GetCurrentProcessId
ReadProcessMemory
SetUnhandledExceptionFilter
SetThreadContext
OpenThread
WideCharToMultiByte
MultiByteToWideChar
TerminateProcess
CreateProcessA
VirtualAlloc
LoadLibraryA
GetCurrentThreadId
GetCurrentProcess
GetCommandLineA
DeleteFileA
InitializeCriticalSection
VirtualProtectEx
VirtualProtect
LeaveCriticalSection
EnterCriticalSection
Thread32Next
GetThreadPriority
Thread32First
CreateToolhelp32Snapshot
IsBadReadPtr
ExitProcess
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
GetPrivateProfileStringA
TerminateThread
CreateThread
Sleep
GetModuleHandleA
GetProcAddress
WriteFile
GetWindowThreadProcessId
GetWindowTextA
CallNextHookEx
_stricmp
_strlwr
_strcmpi
_strupr
sprintf
strlen
memcpy
strcpy
??2@YAPAXI@Z
strrchr
memset
strcat
??3@YAXPAX@Z
strncpy
strchr
strstr
strcmp
__CxxFrameHandler
wcslen
fx
kkk
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ