fa
fb
Static task
static1
Behavioral task
behavioral1
Sample
eacdd65d28551b95b8eb18323a51c40d_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
eacdd65d28551b95b8eb18323a51c40d_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
eacdd65d28551b95b8eb18323a51c40d_JaffaCakes118
Size
5KB
MD5
eacdd65d28551b95b8eb18323a51c40d
SHA1
cb6bb8fc1ea49bdc6f89f29a94e181c9e83960c0
SHA256
6508443d88fda54884b4f9be7df579d0433690a7b42994d6ebc6ee0629df439b
SHA512
805b3ec77712b7dff6d30bd89101a9df67761a3724ea7849a7f099025cecf31ad8d363a6729a372b33b4fc0d584e7be0347c899407b9d1a5682ca407190e252d
SSDEEP
48:azXzjAUlRXbnb6aWN5BMOBjSEsvzdS87+KY5TtYfan8nch2DanfQaEUm6VNI/Lj:szjjbWaWryiJW7+x7wa8cEDafhFm7jj
Checks for missing Authenticode signature.
resource |
---|
eacdd65d28551b95b8eb18323a51c40d_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Sleep
GetCurrentProcess
CreateThread
VirtualProtectEx
GetModuleFileNameA
FindWindowA
UnhookWindowsHookEx
CallNextHookEx
SendMessageA
IsWindowVisible
GetClassNameA
SetWindowsHookExA
FindWindowExA
EnumChildWindows
InternetOpenUrlA
InternetOpenA
InternetCloseHandle
InternetReadFile
malloc
_initterm
free
memcpy
??3@YAXPAX@Z
strcmp
_adjust_fdiv
_stricmp
strlen
??2@YAPAXI@Z
sprintf
strcpy
strrchr
fa
fb
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ