CancelDll
LoadDll
Static task
static1
Behavioral task
behavioral1
Sample
29a06a47ca02bf4a9c871811532e0ae7_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
29a06a47ca02bf4a9c871811532e0ae7_JaffaCakes118.dll
Resource
win10v2004-20241007-en
Target
29a06a47ca02bf4a9c871811532e0ae7_JaffaCakes118
Size
111KB
MD5
29a06a47ca02bf4a9c871811532e0ae7
SHA1
ac0f8338542b2e08c1cb4a9ca429f8e4211d30b3
SHA256
11d83bb128e6114a4dd69896f00822f2ff313ede556d7ef63a7b42a089cfb01f
SHA512
adf59c04fe14a748bb5010191f00d2445e4f6b3f832bcb39ea29474f146a99987fbfa98c0fa7c006a8f3f6ffe34cdfba675446064754351c32ed77f83602c682
SSDEEP
3072:jCwz+tnHYZ0M2+e7TJmi+nhV4cdMnvtol:2w6S0QwQ7nhqcdMnvil
Checks for missing Authenticode signature.
resource |
---|
29a06a47ca02bf4a9c871811532e0ae7_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
DeleteDC
DeleteObject
BitBlt
SelectObject
CreateCompatibleBitmap
CreateCompatibleDC
GetDeviceCaps
CreateDCA
srand
time
_vsnprintf
tolower
strrchr
_except_handler3
memcpy
rand
malloc
free
exit
strncpy
wcsstr
wcscpy
wcsncat
strstr
wcslen
mbstowcs
fopen
fseek
ftell
fclose
??2@YAPAXI@Z
wcscmp
??3@YAXPAX@Z
strlen
sprintf
memset
_strcmpi
_strupr
lstrlenA
MultiByteToWideChar
GetModuleHandleA
GetProcessHeap
HeapAlloc
SetFilePointer
CreateToolhelp32Snapshot
Module32First
Module32Next
CloseHandle
GetTempPathA
DeleteFileA
GetFileSize
ReadFile
WideCharToMultiByte
GetFileAttributesW
GetPrivateProfileStringA
Sleep
LoadLibraryA
FreeLibrary
GetWindow
GetClassNameW
CallNextHookEx
SetWindowsHookExA
UnhookWindowsHookEx
wsprintfA
GetDC
GetWindowRect
CancelDll
LoadDll
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE