CancelDll
LoadDll
Static task
static1
Behavioral task
behavioral1
Sample
254388b72d7ad1c28e952c57df789f56_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
254388b72d7ad1c28e952c57df789f56_JaffaCakes118.dll
Resource
win10v2004-20241007-en
Target
254388b72d7ad1c28e952c57df789f56_JaffaCakes118
Size
104KB
MD5
254388b72d7ad1c28e952c57df789f56
SHA1
e2c02e14b175cd00e27f5ae147ceef8c5088cce8
SHA256
89fdbc5e48cce8444d9b4444a36ca1ef458c1caad0644a3ac73c483936ee9ded
SHA512
7c186d31f36eb9671cabc810eace2e8dc4ae486f3fde2b19a0e0e6bbbf962203936b490e7aea337e130b12e410b44a588fdab28d3f1792da3be3b52d5d3e6d3c
SSDEEP
3072:jCwz+tnHYZ0V0fZvdW3ASOE+xfKBjEVycL:2w6S0VqQ3AhE+xyBjEkcL
Checks for missing Authenticode signature.
resource |
---|
254388b72d7ad1c28e952c57df789f56_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
DeleteDC
DeleteObject
BitBlt
SelectObject
CreateCompatibleBitmap
CreateCompatibleDC
GetDeviceCaps
CreateDCA
srand
time
_vsnprintf
tolower
strrchr
_except_handler3
memcpy
rand
malloc
free
exit
strncpy
wcsstr
wcscpy
wcsncat
strstr
wcslen
mbstowcs
fopen
fseek
ftell
fclose
??2@YAPAXI@Z
wcscmp
??3@YAXPAX@Z
strlen
sprintf
memset
_strcmpi
_strupr
lstrlenA
MultiByteToWideChar
GetModuleHandleA
GetProcessHeap
HeapAlloc
SetFilePointer
CreateToolhelp32Snapshot
Module32First
Module32Next
CloseHandle
GetTempPathA
DeleteFileA
GetFileSize
ReadFile
WideCharToMultiByte
GetFileAttributesW
GetPrivateProfileStringA
Sleep
LoadLibraryA
FreeLibrary
GetWindow
GetClassNameW
CallNextHookEx
SetWindowsHookExA
UnhookWindowsHookEx
wsprintfA
GetDC
GetWindowRect
CancelDll
LoadDll
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE