fa
fc
Static task
static1
Behavioral task
behavioral1
Sample
045a5ead5eed08e1e20b226a87ec0359_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
045a5ead5eed08e1e20b226a87ec0359_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
045a5ead5eed08e1e20b226a87ec0359_JaffaCakes118
Size
7KB
MD5
045a5ead5eed08e1e20b226a87ec0359
SHA1
011f9798fe12f44f50a3d5c22be33bb81cf8c392
SHA256
02e3e0b4228a5ac12092d586b994af39bbb6da79a6e858cf039e153b0e8dfb1b
SHA512
21bf59379a45b519dcf161d62493574f3938ff92da348fd5192acc7df94761ab4c79cb289b1bce54a11909433b0fd7d09bf81169fb0705a67c229022711ec341
SSDEEP
96:W9xM9hGK5Naw6xTqMr8QcM2LSfDfiCbe/rzhGafkNashOjfo:dh55kNhcasTNRBsuo
Checks for missing Authenticode signature.
resource |
---|
045a5ead5eed08e1e20b226a87ec0359_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
CreateThread
Sleep
VirtualProtectEx
MultiByteToWideChar
ReadProcessMemory
GlobalLock
GlobalAlloc
IsBadReadPtr
WideCharToMultiByte
GetCurrentProcess
GlobalFree
GetModuleFileNameA
SetWindowsHookExA
UnhookWindowsHookEx
CallNextHookEx
InternetReadFile
InternetCloseHandle
InternetOpenUrlA
InternetOpenA
_adjust_fdiv
malloc
_initterm
free
_stricmp
strcmp
strrchr
??3@YAXPAX@Z
strcpy
??2@YAPAXI@Z
sprintf
strlen
strncpy
strchr
strstr
fclose
fread
fopen
memset
memcpy
fa
fc
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ