Ft
Hto
Tevkno
Static task
static1
Behavioral task
behavioral1
Sample
3dbaa2c4898b15b331ef6352c054a224_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3dbaa2c4898b15b331ef6352c054a224_JaffaCakes118.dll
Resource
win10v2004-20241007-en
Target
3dbaa2c4898b15b331ef6352c054a224_JaffaCakes118
Size
116KB
MD5
3dbaa2c4898b15b331ef6352c054a224
SHA1
81b1508fc499668cfc278ee0de5048b649a37a4b
SHA256
6dbf81c7ce27aa1d0bcd0b19351a03f99ee50d8e4d77028d8c51359925661138
SHA512
46a3fbf3f0920224e3e91196f2035d6a022ab5c0a72db5c4da6a87a5212441424228afa5b06fda663f8cb7694db1715cb1016c13bf4af4a4212f5fcb0f3b4b24
SSDEEP
3072:ajrOxeiixXp+ULTy+1hUt/nnGK7h/X+zH4W+W:B5ULTh1hUtRc+
Checks for missing Authenticode signature.
resource |
---|
3dbaa2c4898b15b331ef6352c054a224_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
CloseHandle
CompareStringA
ExitProcess
GetACP
GetCommandLineA
GetModuleHandleA
GetOEMCP
GetPrivateProfileStringA
GetStartupInfoA
GetSystemTime
HeapAlloc
RtlUnwind
SetEndOfFile
SetLastError
SetUnhandledExceptionFilter
TlsFree
UnmapViewOfFile
VirtualFree
lstrcatA
lstrcpyA
ToAscii
ShowOwnedPopups
OemToCharBuffA
LoadAcceleratorsW
GetFocus
EndDeferWindowPos
EnableWindow
DestroyIcon
CharPrevA
GetWindowTextA
LsaEnumerateTrustedDomains
LsaGetQuotasForAccount
LsaGetRemoteUserName
LsaLookupNames
LsaLookupPrivilegeDisplayName
__vbaCyStr
__vbaCyInt
__vbaCyAbs
__vbaExitEachVar
__vbaAryConstruct2
__vbaExitEachColl
__vbaExitEachAry
__vbaEraseKeepData
__vbaDateVar
__vbaCyVar
DirectInputCreateA
DirectInputCreateEx
DirectInputCreateW
Ft
Hto
Tevkno
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ