CancelDll
LoadDll
Static task
static1
Behavioral task
behavioral1
Sample
2c63aa36c986ac9c040cde815cbca6bc_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2c63aa36c986ac9c040cde815cbca6bc_JaffaCakes118.dll
Resource
win10v2004-20241007-en
Target
2c63aa36c986ac9c040cde815cbca6bc_JaffaCakes118
Size
102KB
MD5
2c63aa36c986ac9c040cde815cbca6bc
SHA1
27a362853c5ad65b1186735a5c147890dee20da0
SHA256
dba6cc0c92611c5f33b3b22ac3220e70f64eb7b18c4d07420d73efcedca378be
SHA512
15dd59bef3a86d97e7c8b17f05ec5d80638ee34977593136ece605a102ca586890ab13df58f75cef2588310790d74afa857ca11f58116aa9c52ab8b8f469ae44
SSDEEP
1536:Eh1T6DE3TEYkJUpltdoGLG0Wka2dIjT9zhIL+dx+my1nmIeXBaHZk:EfEYkJqoGLWV2y5zhIEDWIBV
Checks for missing Authenticode signature.
resource |
---|
2c63aa36c986ac9c040cde815cbca6bc_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
??2@YAPAXI@Z
wcscmp
fclose
strcpy
sprintf
memset
ftell
fseek
_vsnprintf
tolower
_except_handler3
memcpy
malloc
exit
strrchr
wcsstr
wcscpy
wcsncat
strstr
time
srand
rand
strcat
wcslen
strcmp
strncpy
free
_stricmp
strlen
mbstowcs
??3@YAXPAX@Z
fopen
_strupr
_strcmpi
CreateDCA
GetDeviceCaps
CreateCompatibleDC
CreateCompatibleBitmap
SelectObject
BitBlt
DeleteObject
DeleteDC
MultiByteToWideChar
GetModuleHandleA
GetProcessHeap
HeapAlloc
SetFilePointer
CloseHandle
GetFileSize
ReadFile
WideCharToMultiByte
GetFileAttributesW
GetTempPathA
DeleteFileA
GetModuleFileNameA
GetPrivateProfileStringA
Sleep
OpenProcess
TerminateProcess
GetCurrentProcess
LoadLibraryA
FreeLibrary
lstrlenA
wsprintfA
GetWindow
GetClassNameW
CallNextHookEx
SetWindowsHookExA
UnhookWindowsHookEx
GetDC
GetWindowRect
CancelDll
LoadDll
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE