SelfEject
SelfInject
Static task
static1
Behavioral task
behavioral1
Sample
268d96efed46d41f373b5a73ece261f8_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
268d96efed46d41f373b5a73ece261f8_JaffaCakes118.dll
Resource
win10v2004-20241007-en
Target
268d96efed46d41f373b5a73ece261f8_JaffaCakes118
Size
32KB
MD5
268d96efed46d41f373b5a73ece261f8
SHA1
ff4e525a3205ed303cf9720da89889db20070af8
SHA256
c435c77b471082428862bc54a6e686fd5e791908f03c561de53622c646204de4
SHA512
a1137473873a87822e3cafc8b3e567c2330a28958887579d2624687788343509a24d70b9cc4f2396eba8654a09934f780f93ba4eaeb7a91ca910af5b6f2327c8
SSDEEP
384:YwqgMLxZT2lC1/rMm7HmlE+9yB5qNoozo9ql1:Ywq1xZT2QtJ7Q/Nxzo92
Checks for missing Authenticode signature.
resource |
---|
268d96efed46d41f373b5a73ece261f8_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetProcAddress
GetModuleHandleA
lstrcmpA
VirtualProtect
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
GetCurrentProcessId
GetCommandLineA
GetVersion
ExitProcess
TerminateProcess
GetCurrentProcess
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
TlsGetValue
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
HeapFree
WriteFile
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
HeapAlloc
GetCPInfo
GetACP
GetOEMCP
VirtualAlloc
HeapReAlloc
LoadLibraryA
MultiByteToWideChar
RtlUnwind
UnhookWindowsHookEx
SetWindowsHookExA
CallNextHookEx
RegEnumValueA
SelfEject
SelfInject
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ