x
y
z
Static task
static1
Behavioral task
behavioral1
Sample
fb374748ebbc12227f142140a89eb3a7_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fb374748ebbc12227f142140a89eb3a7_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
fb374748ebbc12227f142140a89eb3a7_JaffaCakes118
Size
28KB
MD5
fb374748ebbc12227f142140a89eb3a7
SHA1
f051c891276961132aede8aee63f6f3cb42e6ea3
SHA256
8efdd7b31bcdf229ede7335833fff618f0bc938a215a5c8b57bd5072b954a33c
SHA512
ef4cecf2637ee5cce579ef9ea284edb4cf6326aa1f1e9673da00d8dbe5fed1118ac69922ec922578baa1d3e8bf84e788e2695c00dd251278725454fac3ab8642
SSDEEP
384:Ihu+9yRkcZUEOATRDu0BKKoenwHH9mOdK19eJ89K/DoTAOurpuW46JBvRBfg:iNAZUEZTRDu+w95d4vAOuFl46JBJd
Checks for missing Authenticode signature.
resource |
---|
fb374748ebbc12227f142140a89eb3a7_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetProcessHeap
HeapFree
HeapReAlloc
GetTempFileNameA
GetTempPathA
GetProcAddress
GetModuleHandleA
lstrcatA
MulDiv
GetTickCount
CloseHandle
ReadFile
CreateFileA
WaitForMultipleObjects
WaitForSingleObject
DeleteFileA
HeapAlloc
SetFilePointer
GetModuleFileNameA
InterlockedExchange
RtlUnwind
WriteFile
GetModuleHandleW
ResetEvent
GetCommandLineW
FindNextFileW
OpenEventA
PulseEvent
lstrlenA
CreateProcessA
VirtualQuery
GetLastError
GlobalAlloc
lstrcpynA
lstrcpyA
CreateEventA
GlobalFree
ShowWindowAsync
wsprintfA
CallWindowProcA
DestroyWindow
EnableWindow
GetWindowLongA
RegisterWindowMessageA
SetWindowLongA
MessageBoxA
SetWindowTextA
SendMessageA
GetDlgItem
GetFocus
IsWindowVisible
ShowWindow
SetDlgItemTextA
CharLowerBuffA
GetClientRect
GetWindowRect
CreateWindowExA
RegOpenKeyA
RegQueryValueExA
RegCloseKey
RegEnumValueA
RegOpenKeyExA
InternetReadFile
InternetSetFilePointer
HttpOpenRequestA
InternetCrackUrlA
FindCloseUrlCache
FindFirstUrlCacheEntryA
InternetCloseHandle
InternetOpenA
InternetConnectA
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
x
y
z
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ