?Olololololo11@@YGPAXXZ
?Olololololo22@@YGPAXXZ
Static task
static1
Behavioral task
behavioral1
Sample
09787fc65de818848880b123f7161e12_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
09787fc65de818848880b123f7161e12_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
09787fc65de818848880b123f7161e12_JaffaCakes118
Size
96KB
MD5
09787fc65de818848880b123f7161e12
SHA1
714fb9e25996d846f476abbf0a4e0f1e6c1d728c
SHA256
d9b6c36e7b4a8ea0773c4375760193da890d81618441a67303a096c2886388e4
SHA512
f1655b79b543bcdaf9004e7e2799e1162ed902942a4a13fc5092292312abd3436fabdfe254d8d3a1c499cd467e7fc6376b5ff3362833ff55615617594fd36bfc
SSDEEP
1536:7U0kJZWqwqPNeekhV/tKB7ULT6on9khAFA3d7WKdiTe2Q6LEnotA:TkJZPwQkhyBqT7FzPeSHt
Checks for missing Authenticode signature.
resource |
---|
09787fc65de818848880b123f7161e12_JaffaCakes118 |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetModuleBaseNameA
GetCurrentProcess
HeapFree
WaitForSingleObject
VirtualFree
GetProcessHeap
TlsSetValue
OpenProcess
GlobalAlloc
TerminateThread
ReadProcessMemory
CreateProcessA
TerminateProcess
HeapAlloc
GlobalFree
LoadLibraryA
OpenThread
MoveFileA
GetExitCodeThread
GetModuleFileNameA
GetModuleHandleA
GetCurrentThreadId
CloseHandle
WriteProcessMemory
SuspendThread
ResumeThread
VirtualQuery
TlsGetValue
GetFileSize
CreateFileA
ReleaseSemaphore
CreateSemaphoreA
VirtualAlloc
SetScrollInfo
UpdateWindow
SetWindowTextA
PostMessageA
ShowWindow
CreateWindowExA
InvalidateRect
GetScrollInfo
SetWindowLongA
GetMenu
ModifyMenuA
SendMessageA
GetWindowRect
DestroyWindow
GetActiveWindow
DrawTextA
GetWindowInfo
GetDC
ReleaseDC
SetWindowPos
FindWindowA
GetForegroundWindow
MoveWindow
MoveToEx
Polyline
CreateCompatibleDC
SelectObject
DeleteDC
LineTo
BitBlt
CreatePen
_except_handler3
memset
?Olololololo11@@YGPAXXZ
?Olololololo22@@YGPAXXZ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ