CancelDll
LoadDll
Static task
static1
Behavioral task
behavioral1
Sample
0a9cf3342e07745613d200a8300da234_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
0a9cf3342e07745613d200a8300da234_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
0a9cf3342e07745613d200a8300da234_JaffaCakes118
Size
99KB
MD5
0a9cf3342e07745613d200a8300da234
SHA1
85dc3b554b332ed025b30f9c977c581c0a6058c7
SHA256
a46a87c7b72d9ca474ed260ef269c6b1d51bb7c758bd5d2ec340492d0912004b
SHA512
6c4b95896cecf0a8ea0265595b664855bd4e1e414467daaed8e584a6ee913ac026bca7c6be6bed6a52d5c99ccb5fffcd91d41446db612249b2912cbe7a52c683
SSDEEP
1536:Eh1T6DE3TEYkJUpltBXBalJG43NvDUOakpGWz0v0kn8TUasRcU+Qw:EfEYkJyolJdvDUOakAA46TU1K
Checks for missing Authenticode signature.
resource |
---|
0a9cf3342e07745613d200a8300da234_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
??2@YAPAXI@Z
wcscmp
fclose
strcpy
sprintf
memset
ftell
fseek
_vsnprintf
tolower
_except_handler3
memcpy
malloc
exit
strrchr
wcsstr
wcscpy
wcsncat
strstr
time
srand
rand
strcat
wcslen
strcmp
strncpy
free
_stricmp
strlen
mbstowcs
??3@YAXPAX@Z
fopen
_strupr
_strcmpi
CreateDCA
GetDeviceCaps
CreateCompatibleDC
CreateCompatibleBitmap
SelectObject
BitBlt
DeleteObject
DeleteDC
MultiByteToWideChar
GetModuleHandleA
GetProcessHeap
HeapAlloc
SetFilePointer
CloseHandle
GetFileSize
ReadFile
WideCharToMultiByte
GetFileAttributesW
GetTempPathA
DeleteFileA
GetModuleFileNameA
GetPrivateProfileStringA
Sleep
OpenProcess
TerminateProcess
GetCurrentProcess
LoadLibraryA
FreeLibrary
lstrlenA
wsprintfA
GetWindow
GetClassNameW
CallNextHookEx
SetWindowsHookExA
UnhookWindowsHookEx
GetDC
GetWindowRect
CancelDll
LoadDll
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE