DownLink
Install
UpLink
Static task
static1
Behavioral task
behavioral1
Sample
5542e9f0368e4e73d510669eb0163184_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5542e9f0368e4e73d510669eb0163184_JaffaCakes118.dll
Resource
win10v2004-20241007-en
Target
5542e9f0368e4e73d510669eb0163184_JaffaCakes118
Size
156KB
MD5
5542e9f0368e4e73d510669eb0163184
SHA1
4f28b84599bfe3ab300fe947da03489dd78ff13b
SHA256
ed39c996652bfac57b74a1e744c24465c3b445d70b5eb1eefb5e362b237cc64c
SHA512
e52a00ae2692c491b0c0ee18fe0a2ce3facfac711d3b1484a18c18bbd2dcb5787afe3196e608e77c6f2af4efe5a1facf8e46dffcf4da5decfeff0873cedb3398
SSDEEP
3072:QG2nb11GVTOeP5xh+ppanECyJRPjE/AYNHjE+ceo7Tho6ng:QTn/GVbP5xcppnPQndjEl9ThTg
Checks for missing Authenticode signature.
resource |
---|
5542e9f0368e4e73d510669eb0163184_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
VirtualQuery
WriteProcessMemory
GetCurrentProcess
VirtualProtect
lstrcmpiA
GetModuleFileNameA
LoadLibraryA
LoadLibraryW
LoadLibraryExA
LoadLibraryExW
WriteFile
CreateFileA
ReadFile
GetFileSize
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
Sleep
OpenFileMappingA
SetLastError
GetLastError
CreateThread
DeleteCriticalSection
TerminateThread
GetExitCodeThread
LeaveCriticalSection
EnterCriticalSection
CreateToolhelp32Snapshot
ConnectNamedPipe
CreateNamedPipeA
InitializeCriticalSection
HeapAlloc
HeapFree
HeapSize
HeapReAlloc
DeleteFileA
Process32Next
TerminateProcess
OpenProcess
Process32First
SetThreadPriority
GetCurrentThread
HeapCreate
HeapDestroy
SetEnvironmentVariableA
CompareStringW
CompareStringA
SetEndOfFile
GetOEMCP
Module32First
Module32Next
CloseHandle
GetModuleHandleA
GetProcAddress
GetCurrentProcessId
GetACP
GetSystemInfo
DisconnectNamedPipe
RtlUnwind
InterlockedDecrement
InterlockedIncrement
GetTimeZoneInformation
GetSystemTime
GetLocalTime
GetCommandLineA
GetVersion
GetEnvironmentVariableA
GetVersionExA
VirtualFree
VirtualAlloc
IsBadWritePtr
ExitProcess
MultiByteToWideChar
GetStringTypeA
GetStringTypeW
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
TlsGetValue
WideCharToMultiByte
LCMapStringA
LCMapStringW
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetUnhandledExceptionFilter
IsBadReadPtr
IsBadCodePtr
SetFilePointer
SetStdHandle
FlushFileBuffers
GetCPInfo
InterlockedExchange
CallNextHookEx
SendMessageA
PostMessageA
UnhookWindowsHookEx
SetWindowsHookExA
FindWindowA
RegCloseKey
RegCreateKeyExA
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
SHRegSetUSValueA
ImageDirectoryEntryToData
DownLink
Install
UpLink
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ