CancelDll
LoadDll
Static task
static1
Behavioral task
behavioral1
Sample
053f6a55e28a44a783a14e21f3c1a8ff_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
053f6a55e28a44a783a14e21f3c1a8ff_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
053f6a55e28a44a783a14e21f3c1a8ff_JaffaCakes118
Size
6.5MB
MD5
053f6a55e28a44a783a14e21f3c1a8ff
SHA1
c5359f862c47af6c8c7cff898cd913d60065b81c
SHA256
4360fffd242a3f2552e66167298edbd95431b303746faa801670d2ee0c603c43
SHA512
19794f8b18859f8292bd161db8d80df18dbfb8e838503c0ffffb03170ccc0b13282b65692919fed4f8204716de0e23ef23a141b45fad8711b04de695067305f8
SSDEEP
1536:EBHHkhl56D7a3PGimetDvfirGgztg5htyH+viSDHDtYDg:EBQj6DO3urQPgzy5hHiSDjn
Checks for missing Authenticode signature.
resource |
---|
053f6a55e28a44a783a14e21f3c1a8ff_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
_vsnprintf
realloc
isdigit
isalpha
tolower
_strupr
_strcmpi
__CxxFrameHandler
atoi
isprint
memcmp
malloc
exit
strrchr
??3@YAXPAX@Z
strcpy
strncpy
wcsstr
wcscpy
wcsncat
strstr
wcslen
time
srand
rand
strcat
free
strchr
memset
memcpy
sprintf
_except_handler3
strlen
mbstowcs
fopen
fseek
ftell
fclose
??2@YAPAXI@Z
wcscmp
_stricmp
_strdup
connect
htons
socket
WSAStartup
send
gethostbyname
recv
DeleteObject
BitBlt
SelectObject
CreateCompatibleBitmap
CreateCompatibleDC
GetDeviceCaps
CreateDCA
DeleteDC
WideCharToMultiByte
GetFileAttributesW
GetTempPathA
DeleteFileA
ReadFile
GetPrivateProfileStringA
Sleep
GetCurrentProcessId
LoadLibraryA
FreeLibrary
GetFileSize
CloseHandle
SetFilePointer
HeapAlloc
GetProcessHeap
GetModuleHandleA
MultiByteToWideChar
lstrlenA
lstrcpynA
UnhookWindowsHookEx
SetWindowsHookExA
GetDC
GetWindowRect
wvsprintfA
GetWindow
GetWindowThreadProcessId
GetWindowTextA
wsprintfA
GetClassNameW
CallNextHookEx
CancelDll
LoadDll
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE