fa
fb
Static task
static1
Behavioral task
behavioral1
Sample
fe5042f0cd094888ceb5ed11a511281b_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fe5042f0cd094888ceb5ed11a511281b_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
fe5042f0cd094888ceb5ed11a511281b_JaffaCakes118
Size
6KB
MD5
fe5042f0cd094888ceb5ed11a511281b
SHA1
535c6f44391693a9d9405e3766f4f0a17f9e8d67
SHA256
d5b0b8d8d0f75a10a16371fa392b26d8e8725d553334a189fdfa58bd5260f4a2
SHA512
a451d62c5ec2684d8d265a46f5c209187282e8065f42bff9f7d0b51bb67d1aa6029b1a99d795d544dce86552d0684a77af02d266870ba257355a98fb1bd76c4f
SSDEEP
96:tMtY+6OMV+TUnaXEjIA8m5a2sLiqiQQEoukBLEiEaflZQf8GFrC:ulacUNjIA+2sLiRQQZBBLpL6q
Checks for missing Authenticode signature.
resource |
---|
fe5042f0cd094888ceb5ed11a511281b_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Sleep
CreateThread
WriteProcessMemory
GetModuleFileNameA
GetCurrentProcess
ReadProcessMemory
WideCharToMultiByte
UnhookWindowsHookEx
CallNextHookEx
SetWindowsHookExA
InternetOpenA
InternetReadFile
InternetCloseHandle
InternetOpenUrlA
_adjust_fdiv
malloc
_initterm
free
memcpy
_stricmp
??3@YAXPAX@Z
strrchr
strcpy
sprintf
??2@YAPAXI@Z
strlen
fclose
fread
fseek
memset
fopen
strcat
fa
fb
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ