CancelDll
LoadDll
Static task
static1
Behavioral task
behavioral1
Sample
387d157e6280358d23a27f5429ac1bf0_JaffaCakes118.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
387d157e6280358d23a27f5429ac1bf0_JaffaCakes118.dll
Resource
win10v2004-20241007-en
Target
387d157e6280358d23a27f5429ac1bf0_JaffaCakes118
Size
119KB
MD5
387d157e6280358d23a27f5429ac1bf0
SHA1
b62bada53e0e968fa6eb6f35e04065ba53eda9d1
SHA256
7c633a02b5765b6ad6c71c44df26dc7bc6ce0eb43d385f34f3c63a7df24d1bc5
SHA512
1742b9042bb00b4cb5cbeff61c5debabf4a76dc400da6f10b80961e6f66c3a00c66d53537982fda8dded4b3d694c1396390d2d6d275e52774e4d1d547c7f7920
SSDEEP
3072:HT6aRIrWwqZUYgR+/dZKO0FfyfOcHp+MF:HTVIaCO0fyfOCpDF
Checks for missing Authenticode signature.
resource |
---|
387d157e6280358d23a27f5429ac1bf0_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
memset
_vsnprintf
tolower
_except_handler3
memcpy
malloc
exit
strrchr
wcsstr
wcscpy
wcsncat
strstr
time
srand
rand
strcat
wcslen
strcmp
strncpy
free
_stricmp
strlen
mbstowcs
fopen
fseek
ftell
fclose
??2@YAPAXI@Z
wcscmp
??3@YAXPAX@Z
strcpy
sprintf
_strupr
_strcmpi
CreateDCA
GetDeviceCaps
CreateCompatibleDC
CreateCompatibleBitmap
SelectObject
BitBlt
DeleteObject
DeleteDC
SetFilePointer
CloseHandle
GetFileSize
ReadFile
WideCharToMultiByte
GetFileAttributesW
GetTempPathA
DeleteFileA
GetModuleFileNameA
GetPrivateProfileStringA
OpenProcess
HeapAlloc
GetProcessHeap
MultiByteToWideChar
lstrlenA
Sleep
GetModuleHandleA
FreeLibrary
LoadLibraryA
GetCurrentProcess
TerminateProcess
wsprintfA
GetWindow
GetClassNameW
CallNextHookEx
SetWindowsHookExA
UnhookWindowsHookEx
GetDC
GetWindowRect
CancelDll
LoadDll
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE