AdviseBrowser
SetCheckLeak
SetCheckUrl
SetCheckVirus
WebSafeWhite
testExploit
testVirus
Static task
static1
Behavioral task
behavioral1
Sample
3f2550f11f07a5d217a6ded198009e6a_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3f2550f11f07a5d217a6ded198009e6a_JaffaCakes118.dll
Resource
win10v2004-20241007-en
Target
3f2550f11f07a5d217a6ded198009e6a_JaffaCakes118
Size
406KB
MD5
3f2550f11f07a5d217a6ded198009e6a
SHA1
cd26631d9f94fec7a281e2c36bd73743bac280a7
SHA256
7db7429407750f48f95708d40da4eba823498be6bc573bb013407eb7effd3c67
SHA512
60264863b33f959832a15f048adcc85aac4b17b29d974b4ceabbfadb51475e672708f29c4fb815f478a6ac231448e9e8ced53712d8851162ce8743a9626d9bad
SSDEEP
3072:Io/IgSTKQVTYbTQvC6rbmbJQke+kq+g4+h5CW:H/IgSTjvvZrbiBUpg46
Checks for missing Authenticode signature.
resource |
---|
3f2550f11f07a5d217a6ded198009e6a_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetWindowsDirectoryW
LoadLibraryW
FreeLibrary
GetProcAddress
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
GetModuleFileNameA
GetCurrentThreadId
DeleteFileA
DeleteFileW
WriteFile
WriteFileEx
CreateProcessW
CreateProcessA
WinExec
VirtualProtect
VirtualProtectEx
OutputDebugStringW
SetFilePointer
SetLastError
LoadLibraryA
ExitThread
GetVersion
VirtualQuery
TerminateProcess
GetCurrentProcess
DisableThreadLibraryCalls
GetLastError
ResumeThread
GetThreadContext
SetThreadContext
InterlockedCompareExchange
GetSystemWindowsDirectoryW
VirtualAlloc
SuspendThread
GetModuleHandleW
InitializeCriticalSectionAndSpinCount
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
HeapReAlloc
GetModuleHandleA
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
VirtualFree
HeapDestroy
HeapCreate
GetEnvironmentStringsW
FreeEnvironmentStringsW
ExpandEnvironmentStringsW
GetModuleFileNameW
InterlockedDecrement
Sleep
GetCurrentThread
LockResource
LoadResource
FindResourceW
InterlockedIncrement
WideCharToMultiByte
lstrlenW
FlushInstructionCache
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
ExitProcess
HeapSize
LCMapStringW
MultiByteToWideChar
LCMapStringA
HeapAlloc
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
IsValidCodePage
GetOEMCP
GetACP
LocalFree
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCommandLineA
RaiseException
RtlUnwind
HeapFree
GetCPInfo
DrawTextW
TrackMouseEvent
SetWindowTextW
GetDlgItem
MoveWindow
ClientToScreen
GetWindowRect
GetSysColor
PostMessageW
DialogBoxIndirectParamW
EndDialog
LoadBitmapW
DefWindowProcW
CallWindowProcW
ShowWindow
EndPaint
GetSystemMetrics
GetWindowTextW
GetParent
BeginPaint
GetWindowLongW
SetWindowLongW
InvalidateRect
SendMessageW
GetClientRect
IsWindowVisible
IsWindow
SelectObject
GetStockObject
DeleteDC
StretchBlt
CreateCompatibleDC
DeleteObject
SetTextColor
SetBkMode
GetTextMetricsW
CreateFontIndirectW
GetObjectW
ShellExecuteExW
ShellExecuteA
CoTaskMemAlloc
CoTaskMemFree
SysFreeString
SysAllocStringByteLen
SysStringByteLen
SysStringLen
SysAllocString
CoGetClassObjectFromURL
URLDownloadToFileW
URLDownloadToFileA
PathFileExistsW
PathIsURLW
AdviseBrowser
SetCheckLeak
SetCheckUrl
SetCheckVirus
WebSafeWhite
testExploit
testVirus
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ