ConvertURL
ParseEmailAdr
ParseEmailAdrEx
ParseURL
UrlToGbk
host_toace
host_togbk
Static task
static1
Behavioral task
behavioral1
Sample
ff2eb8038bc2afefff72e2b0f40a5f96_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ff2eb8038bc2afefff72e2b0f40a5f96_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
ff2eb8038bc2afefff72e2b0f40a5f96_JaffaCakes118
Size
52KB
MD5
ff2eb8038bc2afefff72e2b0f40a5f96
SHA1
9310c0a466b08ba8b3023281764bb859ad284341
SHA256
169be591af113c14fda8dd95892549faa5bb4621a7ce4caae94e744282d80030
SHA512
9f4349c717ea6666c6104bf71332adf3e9d2dea910f1edba8f78551a2a1fc1318279fa4f920afe9c8a471baee92c7a4676f6c5a3b4b41b207754e800a2140eeb
SSDEEP
768:ieIXGZrywYbsRETCBhqFdsFvtWo95swRNP:BI2rRRETCBszicoIwR
Checks for missing Authenticode signature.
resource |
---|
ff2eb8038bc2afefff72e2b0f40a5f96_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetStartupInfoA
HeapAlloc
GetProcessHeap
MultiByteToWideChar
WideCharToMultiByte
GetCommandLineA
GetVersion
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
ExitProcess
GetCPInfo
GetACP
GetOEMCP
LCMapStringA
LCMapStringW
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
GetLastError
TerminateProcess
GetCurrentProcess
SetHandleCount
GetStdHandle
GetFileType
HeapFree
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
WriteFile
GetStringTypeA
GetStringTypeW
RtlUnwind
VirtualAlloc
HeapReAlloc
GetProcAddress
LoadLibraryA
ConvertURL
ParseEmailAdr
ParseEmailAdrEx
ParseURL
UrlToGbk
host_toace
host_togbk
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ