CreateProcessNotify
DllClientCleanup
atmaHost
DllClientStartup
Static task
static1
Behavioral task
behavioral1
Sample
25f34de3459beeb03f881f06f2fd0d62_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
25f34de3459beeb03f881f06f2fd0d62_JaffaCakes118.dll
Resource
win10v2004-20241007-en
Target
25f34de3459beeb03f881f06f2fd0d62_JaffaCakes118
Size
62KB
MD5
25f34de3459beeb03f881f06f2fd0d62
SHA1
0b750327e1808d38168fa7522bd792aae12c3cae
SHA256
01733a548926474281df1fc056de1750437a5ceb648597453d1c916c79844ca3
SHA512
0d20de2efede293a54ba47a700af9c664f732bdaf29ef4454a666563f427ab946ab5bbfea2c25794b0c3eb8103b21989b8276d1872396c3de338ffdbd028c2ff
SSDEEP
1536:j3NqfM5E5W0d36KSNHCjXDpMIi1qNPfKxQLE:pyM+5W0F6KSNeXDpMJ1mfMQL
Checks for missing Authenticode signature.
resource |
---|
25f34de3459beeb03f881f06f2fd0d62_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
CloseHandle
WaitForSingleObject
GetCurrentDirectoryA
GetPrivateProfileStructA
FindFirstFileA
GetFileAttributesA
lstrlenA
SetFileAttributesA
UnmapViewOfFile
CreateFileA
MapViewOfFile
GetCurrentProcess
SetFilePointer
lstrcpyA
FindClose
VirtualAlloc
lstrcpynA
GetProcAddress
WriteFile
VirtualFree
GetComputerNameA
WaitForMultipleObjects
GetModuleHandleA
GetCommandLineA
ResumeThread
ReadFile
lstrlenW
VirtualProtectEx
FindNextFileA
SetCurrentDirectoryA
VirtualLock
TerminateProcess
DeleteFileA
WideCharToMultiByte
WritePrivateProfileStructA
GetVersion
CreatePipe
CreateFileMappingA
LoadLibraryA
IsBadReadPtr
VirtualUnlock
SetEndOfFile
VirtualQuery
asctime
mktime
toupper
GetWindowDC
IsDlgButtonChecked
SetDlgItemTextA
GetClipboardData
KillTimer
SendDlgItemMessageA
SetForegroundWindow
EndDialog
GetDlgItemTextA
FindWindowA
SetTimer
MessageBeep
CharLowerA
CharUpperA
DestroyMenu
InvalidateRect
SetMenuItemInfoA
EnableMenuItem
SetWindowTextA
CheckMenuRadioItem
wvsprintfA
SetClipboardData
CheckRadioButton
SetFocus
AppendMenuA
ScreenToClient
GetDlgItem
SendMessageA
ShowWindow
EnumClipboardFormats
_Sinh
_FSnan
_LSinh
_LSnan
_LPoly
_Mbrtowc
_Snan
_Rteps
_LDscale
_Strxfrm
_LCosh
_Eps
_Toupper
_Getctype
_FRteps
_FExp
_Xbig
_Tolower
_LEps
_FInf
_LXbig
_Nan
_FDscale
_FDtest
_LInf
_FDenorm
_Getcvt
_Stod
_LRteps
_Denorm
GetSaveFileNameA
BindImageEx
LookupPrivilegeValueA
RegDeleteKeyA
RegCloseKey
RegCreateKeyExA
OpenProcessToken
DeleteObject
SetBkMode
CreateFontIndirectA
CreateProcessNotify
DllClientCleanup
atmaHost
DllClientStartup
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ