a
b
c
Static task
static1
Behavioral task
behavioral1
Sample
3e85e67ed17cf164a3ac7132956c681e_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3e85e67ed17cf164a3ac7132956c681e_JaffaCakes118.dll
Resource
win10v2004-20241007-en
Target
3e85e67ed17cf164a3ac7132956c681e_JaffaCakes118
Size
17KB
MD5
3e85e67ed17cf164a3ac7132956c681e
SHA1
cf670a5d2adf2085949e49dd5528184aab07a235
SHA256
e7bdbe0cd98677827683d79d7ca280b1c4bc3985b83333c7684e808642ba08aa
SHA512
f673bcacd687f9bdb6cc9402c62115179323da98ae343e8d3784abeff86465c3bbd2ec888572004b6ad9e5ceab7f6b1520f35a1ebed085b96d350d87e8bc8846
SSDEEP
384:Ac60Edr+rVRKdUlGK9/R2z0R3IZBL18NtyMA6FYb:AB4XK6j/r6ZBL2ryMb2
Checks for missing Authenticode signature.
resource |
---|
3e85e67ed17cf164a3ac7132956c681e_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
ReadFile
lstrcatA
MultiByteToWideChar
GetProcAddress
GlobalFree
GetTempFileNameA
GetModuleFileNameA
GetModuleHandleA
CloseHandle
GetTempPathA
lstrcpyA
MulDiv
RtlUnwind
CreateEventA
GlobalAlloc
WriteFile
GetProcessHeap
GetTickCount
HeapFree
HeapAlloc
lstrlenA
lstrcpynA
SetFilePointer
HeapReAlloc
lstrcmpA
CreateFileA
InterlockedExchange
GetLastError
OpenEventA
VirtualQuery
SetDlgItemTextA
CallWindowProcA
EnableWindow
SetWindowTextA
IsWindowVisible
DestroyWindow
GetWindowRect
GetFocus
wsprintfA
GetClientRect
SendMessageA
RegisterWindowMessageA
SetWindowLongA
MessageBoxA
IsWindow
CharLowerBuffA
GetWindowLongA
GetDlgItem
ShowWindow
CreateWindowExW
RegOpenKeyExA
RegCloseKey
RegOpenKeyA
RegQueryValueExA
RegSetValueExA
RegEnumValueA
InternetSetFilePointer
HttpOpenRequestA
InternetConnectA
InternetCrackUrlA
FindCloseUrlCache
FindFirstUrlCacheEntryA
InternetOpenA
InternetCloseHandle
GetFileVersionInfoSizeA
a
b
c
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ