ExecutePayload
code
inline_bzero
sc
Static task
static1
Behavioral task
behavioral1
Sample
f59e1979b673348cafd472b0470d595d_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f59e1979b673348cafd472b0470d595d_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
f59e1979b673348cafd472b0470d595d_JaffaCakes118
Size
7KB
MD5
f59e1979b673348cafd472b0470d595d
SHA1
a8c54ae7e32a06dd58ed8926d34a8a48ef03da11
SHA256
47a436ff52c0b1d37f951a7e5ca185d136bacf7043e5c581c9d2bd94ff843969
SHA512
1032b1844590b37e0015dccd067e95c7065923daf52e72c56c66bfd2e2c2ce81cd0cb0af8703ed679f2af5921df3f6c8a26be82f9df8e9aabe5164ed6176e868
SSDEEP
96:PHWaQTNCWRcX4r06S9IdHt5//FkUhP68J:PkCWK99IdHttOYS8J
Checks for missing Authenticode signature.
resource |
---|
f59e1979b673348cafd472b0470d595d_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
IMAGE_FILE_DLL
CloseHandle
CreateProcessA
GetModuleHandleA
GetProcAddress
GetThreadContext
ResumeThread
SetThreadContext
Sleep
VirtualAllocEx
WriteProcessMemory
__dllonexit
_errno
clock
fflush
free
malloc
ExecutePayload
code
inline_bzero
sc
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ