ChatInfoManagerDestroy
ChaterInfoMgrQuery
Static task
static1
Behavioral task
behavioral1
Sample
ef1067e151964e497c9e00a278d23555_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ef1067e151964e497c9e00a278d23555_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
ef1067e151964e497c9e00a278d23555_JaffaCakes118
Size
18KB
MD5
ef1067e151964e497c9e00a278d23555
SHA1
82666aadb9ef57667b2480fc11f9fed107d2fcea
SHA256
47cffac6d8776c2a7a9a6041c576009f78b85dd16747811a400561832d67c2ef
SHA512
cb441888aaef9d31cbdbd52887f412ee7bbb1f79106b8f8f81eacd83e74424024a74d7fc8b8435fd7d38422170e3064136931dd7fd0636fa99c497ad9f0e61a6
SSDEEP
192:fAu/OtxorSFSrZ3Wn4CgLpEvFTc/Ze0JHidOW4DeUFg8GFx9E/HA+1jnhm:YgywonYLOZc7J+OWOe0g8Oxu/HVn
Checks for missing Authenticode signature.
resource |
---|
ef1067e151964e497c9e00a278d23555_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetLastError
CreateMutexA
OpenProcess
GetCurrentProcessId
VirtualFreeEx
WaitForSingleObject
CreateRemoteThread
LoadLibraryA
WriteProcessMemory
VirtualAllocEx
FindClose
FindNextFileA
lstrcpynA
lstrcpyA
lstrcmpA
FindFirstFileA
VirtualProtectEx
ReleaseMutex
Module32First
ReadFile
GetModuleFileNameA
FreeLibrary
CreateThread
Sleep
MoveFileExA
WinExec
TerminateProcess
GetCurrentProcess
CreateToolhelp32Snapshot
Process32First
lstrcmpiA
Process32Next
GetSystemDirectoryA
lstrlenA
GetModuleHandleA
GetProcAddress
WriteFile
CloseHandle
GetTempPathA
Module32Next
GetTickCount
wsprintfA
MapVirtualKeyA
GetKeyboardState
SetThreadDesktop
OpenDesktopA
SetProcessWindowStation
OpenWindowStationA
ToAscii
GetKeyState
VkKeyScanA
OpenProcessToken
AdjustTokenPrivileges
LookupPrivilegeValueA
StrStrIA
InternetCloseHandle
_itoa
strcmp
_purecall
strncpy
memcpy
??2@YAPAXI@Z
strstr
strncat
strcpy
strcat
strlen
memset
??3@YAXPAX@Z
ChatInfoManagerDestroy
ChaterInfoMgrQuery
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ