FDIW_ExtractArchive
FDIW_ExtractFile
Static task
static1
Behavioral task
behavioral1
Sample
eeec3d2f10716edd08b6850f2793071b_JaffaCakes118.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
eeec3d2f10716edd08b6850f2793071b_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
eeec3d2f10716edd08b6850f2793071b_JaffaCakes118
Size
176KB
MD5
eeec3d2f10716edd08b6850f2793071b
SHA1
77ddcfd1c6529db1d235b13e228c0e19f9ee17c6
SHA256
77ec91835accc8d9769de15b2f20ab92e9ede2d81f1a6516784c743af7add650
SHA512
1026532a74bf6ece2a0589a89cd1ab5c581c828e93ba0938d081e3ee44010875877796dd67cd7c0f9d964fff2e632366800291fcf24c3e97ae1144bef22edd41
SSDEEP
3072:2z7mjrJF6WOWrSl4K2sbEOD8NbQsUxIABMYyhcM3Tj8P4B:9SWOWsbStQZyYyhcMn8P4B
Checks for missing Authenticode signature.
resource |
---|
eeec3d2f10716edd08b6850f2793071b_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetStartupInfoA
CreateDirectoryA
GlobalAlloc
SetFileAttributesA
CloseHandle
SetFileTime
LocalFileTimeToFileTime
DosDateTimeToFileTime
CreateFileA
HeapAlloc
HeapFree
GetFileType
GetLastError
ReadFile
WriteFile
SetFilePointer
GetCommandLineA
GetVersion
GetModuleHandleA
GetModuleFileNameA
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
ExitProcess
RtlUnwind
SetStdHandle
SetEndOfFile
SetHandleCount
GetStdHandle
GlobalFree
TerminateProcess
GetCurrentProcess
GetCPInfo
GetACP
GetOEMCP
WideCharToMultiByte
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
GetStringTypeA
GetStringTypeW
InterlockedDecrement
InterlockedIncrement
GetProcAddress
LoadLibraryA
FlushFileBuffers
FDIW_ExtractArchive
FDIW_ExtractFile
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ