Startup
e
iep
l
r
Static task
static1
Behavioral task
behavioral1
Sample
15a5896d0e3d4f902d76401b8faab414_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
15a5896d0e3d4f902d76401b8faab414_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
15a5896d0e3d4f902d76401b8faab414_JaffaCakes118
Size
40KB
MD5
15a5896d0e3d4f902d76401b8faab414
SHA1
396da9f9991ca6c085d88f46caaaa3a33147e483
SHA256
2515150cc4f018c13dfe4d14db54e3dc79f4519632b739886595e62407fcd714
SHA512
4f629bd7b534c7142d669e1cc3d48e80682e32e3b7b4d95f23fbd00239c4932a8eed686d837bfb2a06460d24e8a0d2f73e31d646d62732896aaabd70e1d9c69d
SSDEEP
768:vUt3qlCqsM1fdZdASWJw0T58BEM03s5E:sAlC7M5dZGSg56EMMsq
Checks for missing Authenticode signature.
resource |
---|
15a5896d0e3d4f902d76401b8faab414_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
UrlEscapeW
StrToIntW
PathFileExistsW
StrRStrIW
StrStrIW
StrStrIA
getnameinfo
inet_addr
DnsRecordListFree
DnsQuery_W
InternetCloseHandle
InternetReadFile
InternetOpenUrlW
InternetOpenW
HttpQueryInfoW
lstrcpynA
CreateFileW
GetFileSize
ReadFile
WriteFile
CloseHandle
GetSystemWindowsDirectoryW
GetVolumeInformationW
lstrlenW
lstrcpynW
lstrlenA
lstrcpyA
lstrcmpiA
lstrcatW
WideCharToMultiByte
lstrcatA
SetFilePointer
SetEndOfFile
lstrcpyW
CreateEventW
lstrcmpiW
CreateThread
WaitForSingleObject
SetEvent
CreateProcessW
SuspendThread
TerminateThread
Sleep
GetModuleFileNameW
FreeLibraryAndExitThread
LoadLibraryW
OpenMutexW
GetTickCount
GetLastError
CreateMutexW
GetCurrentProcess
GetProcAddress
VirtualAlloc
VirtualFree
VirtualQuery
MapViewOfFile
CreateFileMappingW
ResetEvent
Process32NextW
OpenProcess
Process32FirstW
CreateToolhelp32Snapshot
GetVersionExW
DisableThreadLibraryCalls
ExitProcess
CreateWaitableTimerW
SetWaitableTimer
GetCurrentThread
GetFileTime
SetFileTime
lstrcmpW
MoveFileW
MoveFileExW
WaitForMultipleObjects
FindFirstFileW
FindNextFileW
FindClose
GetSystemTime
MultiByteToWideChar
UnmapViewOfFile
MsgWaitForMultipleObjects
PeekMessageW
TranslateMessage
DispatchMessageW
CallNextHookEx
PostMessageW
SetWindowsHookExW
wsprintfW
CreateProcessAsUserW
RegQueryValueExW
RegCloseKey
ImpersonateLoggedOnUser
SetNamedSecurityInfoW
OpenProcessToken
RevertToSelf
RegSetValueExW
RegOpenKeyExW
RegFlushKey
RegQueryInfoKeyW
RegEnumValueW
RegNotifyChangeKeyValue
RegCreateKeyExW
SHGetSpecialFolderPathW
SHGetFolderPathW
ord680
StringFromCLSID
CoTaskMemFree
CoCreateGuid
Startup
e
iep
l
r
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ