fa
fb
Static task
static1
Behavioral task
behavioral1
Sample
fd3c63df38a4b3a3acb99f744fc380ff_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fd3c63df38a4b3a3acb99f744fc380ff_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
fd3c63df38a4b3a3acb99f744fc380ff_JaffaCakes118
Size
6KB
MD5
fd3c63df38a4b3a3acb99f744fc380ff
SHA1
90c8fa580d9b52461439ff56eee6a11ff45db175
SHA256
a07a2421bbec3a9ff0bc748a3167ecbde007ba39e5474077c6ff544ef58f69d7
SHA512
a0bb238b104096806ec63c1a341ae71b59bf098f4e1b89d05484de05eb106f95fc25502c12ea3831fec64c1b20d7a11012e0248792bbcebc4aec34234c279bb9
SSDEEP
96:tiuuBcfECALTmyurYvwMAMIjO2IJayKDJIbC:cHsomvYvvJBt5Keb
Checks for missing Authenticode signature.
resource |
---|
fd3c63df38a4b3a3acb99f744fc380ff_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetCommandLineA
ReadProcessMemory
WriteProcessMemory
GlobalFree
WideCharToMultiByte
GlobalAlloc
CreateThread
GetPrivateProfileStringA
GetCurrentProcess
GlobalLock
GetModuleFileNameA
SetWindowsHookExA
UnhookWindowsHookEx
CallNextHookEx
InternetReadFile
InternetOpenUrlA
InternetOpenA
InternetCloseHandle
_adjust_fdiv
_stricmp
malloc
_initterm
free
strlen
strrchr
memset
strcpy
strstr
memcpy
??3@YAXPAX@Z
sprintf
??2@YAPAXI@Z
fa
fb
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ