getActiveDesktop
getSpecials
getSplit
getWnd
Static task
static1
Behavioral task
behavioral1
Sample
fc252024e2269d40ca5ec9592f0463b6_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fc252024e2269d40ca5ec9592f0463b6_JaffaCakes118.dll
Resource
win10v2004-20240910-en
Target
fc252024e2269d40ca5ec9592f0463b6_JaffaCakes118
Size
19KB
MD5
fc252024e2269d40ca5ec9592f0463b6
SHA1
bb057924814c0193ce2716d4c4652b7cfd920f1f
SHA256
26bc42569cc9b10cf2a5aad9142ecc95483c905a5015f8e18c1be49d2c6bb36c
SHA512
43b78d8a86eae879dae757d0c034b76fad2458155a3043ceb38fb90cae5dc657d826a024c4cfe4c781f245201dfe548d78f7fbc07df0004c1d0e908e88cb1cb0
SSDEEP
384:TIOg++z68A2hBgKaDxRLzx7XrzBTRDWrjWt8sCXIIc3jfWS4EWr:cOny68A2hur3Lt7XBUrjbD
Checks for missing Authenticode signature.
resource |
---|
fc252024e2269d40ca5ec9592f0463b6_JaffaCakes118 |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Sleep
GetFileAttributesA
lstrcatA
GetProcAddress
DisableThreadLibraryCalls
LoadLibraryA
GetTempPathA
CreateThread
CreateFileA
WideCharToMultiByte
VirtualFreeEx
MultiByteToWideChar
lstrcmpiA
VirtualAllocEx
lstrcmpiW
GetModuleHandleA
CloseHandle
GetCurrentProcessId
GetFileSize
lstrcmpA
lstrlenA
MapViewOfFile
UnmapViewOfFile
VirtualFree
GetSystemDirectoryA
VirtualAlloc
CreateFileMappingW
VirtualProtect
GetModuleHandleW
GetModuleFileNameA
IsBadReadPtr
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
MessageBoxA
CallNextHookEx
RtlFreeAnsiString
strstr
NtQueryInformationThread
NtClose
NtOpenProcess
RtlUnicodeStringToAnsiString
memset
memcpy
getActiveDesktop
getSpecials
getSplit
getWnd
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ