fa
fc
Static task
static1
Behavioral task
behavioral1
Sample
f09849eebb19ecff4e27116860824207_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f09849eebb19ecff4e27116860824207_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
f09849eebb19ecff4e27116860824207_JaffaCakes118
Size
17KB
MD5
f09849eebb19ecff4e27116860824207
SHA1
4cba90b4e963e39afa5c4a9efa4e82e437c9df37
SHA256
a4f4abddd4ecf24db9a8d3f861f5ae4bfe0cadc01d39776ccd024591c258a387
SHA512
4cd8fb0b622d8665fdc81beb528fbb5e43c7c6bd542a8a61e275f3f0ddde6ff7ab4af988ad513643469d5890af7a1d809e24d1fc07f266223849f1563693d7ce
SSDEEP
384:KRKjP1wUykHkqIuHAZjhJLP7+rdbRkKzJsarfc/NiMMvohlF:KRKZMEJ0hN6rdb1zJtrfc/NiZvOl
Checks for missing Authenticode signature.
resource |
---|
f09849eebb19ecff4e27116860824207_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetModuleFileNameA
GetComputerNameA
WriteProcessMemory
ReadProcessMemory
ExitProcess
GetCurrentProcessId
GlobalUnlock
GlobalLock
GlobalAlloc
Sleep
CreateThread
GetCurrentProcess
GlobalFree
GetWindowThreadProcessId
GetWindowTextA
SetWindowsHookExA
UnhookWindowsHookEx
CallNextHookEx
FindWindowA
InternetOpenUrlA
InternetOpenA
InternetCloseHandle
memset
_adjust_fdiv
malloc
_initterm
free
memcpy
strchr
strncpy
strcmp
strcat
strrchr
??3@YAXPAX@Z
_stricmp
??2@YAPAXI@Z
sprintf
strcpy
strlen
fa
fc
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ