i
l
lck
lf
sd
ss
sss
stsss
sup
u
Static task
static1
Behavioral task
behavioral1
Sample
5206318af399fecc45e36ade12d6b444_JaffaCakes118.dll
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
5206318af399fecc45e36ade12d6b444_JaffaCakes118.dll
Resource
win10v2004-20241007-en
Target
5206318af399fecc45e36ade12d6b444_JaffaCakes118
Size
273KB
MD5
5206318af399fecc45e36ade12d6b444
SHA1
d58b04355e79ac783f1f23f985c459b08dd2d58d
SHA256
12e0529cd9aff640f17bc2235fac98c25b3a7bfed41894c11f97101445c3f5de
SHA512
4d56c3c638d1323cc78d9ceda6c6471ca1b63a9ae83c0e3ce957a327881d90bf077794afc7e478085bc85a2f61a4af82ff2402e6483e0a76e1c12c9f734ffafd
SSDEEP
6144:PiG8x3JmauA9CvJu35NQOWnUtimLudbEWWlL7/25FAE:PiG8x8JxcXQFUzLudy0FAE
Checks for missing Authenticode signature.
resource |
---|
5206318af399fecc45e36ade12d6b444_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
DisableThreadLibraryCalls
CloseHandle
CreateFileW
SetEvent
WinExec
GetDriveTypeW
lstrcmpiW
SetFileAttributesW
Sleep
CreateThread
CreateEventW
WaitForSingleObject
CancelWaitableTimer
CreateWaitableTimerW
SetWaitableTimer
OpenProcess
TerminateProcess
DeleteFileW
GetFileAttributesW
MoveFileExW
GetFileSize
WriteFile
ReadFile
FindResourceExW
LoadResource
LockResource
SizeofResource
GetLogicalDriveStringsW
lstrcpynW
lstrlenW
lstrcmpW
lstrcpyA
lstrlenA
GetProcAddress
LoadLibraryW
GetLastError
LocalFree
lstrcpyW
LocalAlloc
FormatMessageW
GetComputerNameW
GetLocalTime
GetModuleFileNameW
GetSystemDirectoryW
WideCharToMultiByte
MultiByteToWideChar
GetVersionExW
StrRChrW
StrToIntW
StrChrW
StrStrW
StrStrIW
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??0_Lockit@std@@QAE@XZ
??1_Lockit@std@@QAE@XZ
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?find@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDII@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ID@Z
?erase@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@II@Z
memset
??2@YAPAXI@Z
strlen
_CxxThrowException
__CxxFrameHandler
??0exception@@QAE@ABV0@@Z
??1exception@@UAE@XZ
??0exception@@QAE@ABQBD@Z
strchr
free
??1type_info@@UAE@XZ
_initterm
malloc
_adjust_fdiv
__dllonexit
_onexit
memcpy
wsprintfA
wsprintfW
GetWindowTextW
GetWindowTextLengthW
EnumDesktopsW
OpenWindowStationW
CloseDesktop
EnumDesktopWindows
GetWindowThreadProcessId
OpenDesktopW
EnumWindowStationsW
RegCreateKeyExW
RegQueryValueExW
RegQueryValueExA
RegSetValueExW
RegSetValueExA
RegCloseKey
GetModuleBaseNameW
i
l
lck
lf
sd
ss
sss
stsss
sup
u
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ