CancelDll
LoadDll
Static task
static1
Behavioral task
behavioral1
Sample
4516ff1a436c79789e965ab4a2a5ddbe_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
4516ff1a436c79789e965ab4a2a5ddbe_JaffaCakes118.dll
Resource
win10v2004-20241007-en
Target
4516ff1a436c79789e965ab4a2a5ddbe_JaffaCakes118
Size
6.5MB
MD5
4516ff1a436c79789e965ab4a2a5ddbe
SHA1
5baa4e3fa4409b23894eeedeb76e838a9bd1cd8f
SHA256
6cee2686266d2e1c3cf725ca535156a139ad8865e10a016af4a8395096a917aa
SHA512
b1afeea1bd5149bc91f102d65f9f51fa4d48a4b8ab1bedb048210e57e2864afe6c5b93ec426a58eda37fca97f61868a0d1e073327caf0eaf8b37d89462c98dca
SSDEEP
1536:EBHHkhl56D7a3PGimetJ3qlOj568MHBigVdTWzOiG:EBQj6DO3urAP48MhiadqG
Checks for missing Authenticode signature.
resource |
---|
4516ff1a436c79789e965ab4a2a5ddbe_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
_vsnprintf
realloc
isdigit
isalpha
tolower
_strupr
_strcmpi
__CxxFrameHandler
atoi
isprint
memcmp
malloc
exit
strrchr
??3@YAXPAX@Z
strcpy
strncpy
wcsstr
wcscpy
wcsncat
strstr
wcslen
time
srand
rand
strcat
free
strchr
memset
memcpy
sprintf
_except_handler3
strlen
mbstowcs
fopen
fseek
ftell
fclose
??2@YAPAXI@Z
wcscmp
_stricmp
_strdup
connect
htons
socket
WSAStartup
send
gethostbyname
recv
DeleteObject
BitBlt
SelectObject
CreateCompatibleBitmap
CreateCompatibleDC
GetDeviceCaps
CreateDCA
DeleteDC
WideCharToMultiByte
GetFileAttributesW
GetTempPathA
DeleteFileA
ReadFile
GetPrivateProfileStringA
Sleep
GetCurrentProcessId
LoadLibraryA
FreeLibrary
GetFileSize
CloseHandle
SetFilePointer
HeapAlloc
GetProcessHeap
GetModuleHandleA
MultiByteToWideChar
lstrlenA
lstrcpynA
UnhookWindowsHookEx
SetWindowsHookExA
GetDC
GetWindowRect
wvsprintfA
GetWindow
GetWindowThreadProcessId
GetWindowTextA
wsprintfA
GetClassNameW
CallNextHookEx
CancelDll
LoadDll
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE