AR
GetVer
HTTPSendStrFun
w
Static task
static1
Behavioral task
behavioral1
Sample
01dd72115e6704be782aa7d42150c54a_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
01dd72115e6704be782aa7d42150c54a_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
01dd72115e6704be782aa7d42150c54a_JaffaCakes118
Size
60KB
MD5
01dd72115e6704be782aa7d42150c54a
SHA1
617e3a8a5ccb9050feb8c23f1c1eb678415427ca
SHA256
e085bd0716f8286a9e01e65c388e86389ff3877040e299a879fe773f800d8347
SHA512
b6495d776d4fee3fd20831b115d81c16af1f2015924241f7bffd7ba7a626d277934efc72f2e08e590d5d374c7a8b7019711a93ed9f5d3fa97c8a11acad539ee6
SSDEEP
768:0sVFPopTosKBbFnsJJYPVuguNsFnToIf1GvZd6oGMF1x:0sVlopv45nsJkjuNsFnToIf0hkoGC1x
Checks for missing Authenticode signature.
resource |
---|
01dd72115e6704be782aa7d42150c54a_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
CreateThread
GetModuleFileNameA
CloseHandle
GetCurrentProcess
GetStringTypeA
GetTickCount
LCMapStringA
MultiByteToWideChar
WideCharToMultiByte
GetBinaryTypeA
WinExec
DeleteFileA
GetStringTypeW
GetTempPathA
Sleep
LoadLibraryA
GetModuleHandleA
GetProcAddress
lstrcmpiA
GetVersionExA
LCMapStringW
GetSystemInfo
GetMessageA
TranslateMessage
DispatchMessageA
GetSystemMetrics
CallNextHookEx
CharLowerA
wsprintfA
SetWindowsHookExA
LookupPrivilegeValueA
AdjustTokenPrivileges
RegCreateKeyA
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
OpenProcessToken
setsockopt
recv
send
sendto
recvfrom
closesocket
socket
inet_addr
htons
connect
gethostbyname
WSAStartup
strchr
_access
rename
strncmp
atoi
??2@YAPAXI@Z
_splitpath
malloc
free
_adjust_fdiv
sprintf
_except_handler3
strstr
_initterm
AR
GetVer
HTTPSendStrFun
w
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ