COMResModuleInstance
VVVV
YYYY
Static task
static1
Behavioral task
behavioral1
Sample
03e384751f53913f453a0d572185046f_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
03e384751f53913f453a0d572185046f_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
03e384751f53913f453a0d572185046f_JaffaCakes118
Size
21KB
MD5
03e384751f53913f453a0d572185046f
SHA1
ed74e0144fa8eeaa33af38f4a8c2cba6a24583ab
SHA256
7bceaa36254cc16c1c12f2ed6097b3a70d913748c6bf1a8a4b9dc7bb936d2510
SHA512
d32341b7ea4f27f59acc507ad827937df927d74b08f7d0eaa12af37ec095c572cf9588054d14691b82493bda7fd650361cde2b61577f9b825f7c1ddc3852c52b
SSDEEP
384:gPZ2+14X8X64VoQqiLEtO8p93RxBXSky4almIxAJzWWej7:2ZV14X8X6YXLLEM+3RKB4afWs
Checks for missing Authenticode signature.
resource |
---|
03e384751f53913f453a0d572185046f_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
FreeLibrary
GetProcAddress
LoadLibraryA
lstrcatA
GetSystemDirectoryA
IsBadReadPtr
VirtualProtect
CloseHandle
Process32Next
lstrcmpiA
Process32First
CreateToolhelp32Snapshot
lstrcmpA
TerminateProcess
OpenProcess
GetPrivateProfileStringA
Sleep
lstrcpyA
lstrlenA
GetTickCount
lstrcpynA
WritePrivateProfileStringA
GetSystemTime
GetTempPathA
GetModuleFileNameA
GetModuleHandleA
ReadFile
SetFilePointer
CreateFileA
CopyFileA
CreateThread
UnmapViewOfFile
MapViewOfFile
OpenFileMappingA
GetLastError
CreateMutexA
CallNextHookEx
SetWindowsHookExA
GetWindowTextA
PostThreadMessageA
FindWindowA
COMResModuleInstance
VVVV
YYYY
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ