?GetOS@Utility@@SAKXZ
DUMMY
Static task
static1
Behavioral task
behavioral1
Sample
f0b834d7f71823484d16c32fc4f4c6f9_JaffaCakes118.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f0b834d7f71823484d16c32fc4f4c6f9_JaffaCakes118.dll
Resource
win10v2004-20240412-en
Target
f0b834d7f71823484d16c32fc4f4c6f9_JaffaCakes118
Size
48KB
MD5
f0b834d7f71823484d16c32fc4f4c6f9
SHA1
b79f5ae1ecffa6ad285c92b0953fb2a2db86517b
SHA256
8a30061ab2c178e5437a1e7225214342e04741fa5641fc0e4f6980de5c679196
SHA512
d86e519b388baaa91ead04af6f0a10d6b4fb14a39017858e2523cb83c2a816f47f94b3206beb8f0996473098d9aa36416ec68ff24d4790f453db57dc5bb88f26
SSDEEP
768:GHndBXhSmtBISK7jkB1DD5MwIxtrjleNtSTWr7FBvyWotfK/2fNWVvj:Cnd1hvtBI7iR1MwILrBCtSTWr7yk2fsj
Checks for missing Authenticode signature.
resource |
---|
f0b834d7f71823484d16c32fc4f4c6f9_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
MapViewOfFile
CreateFileMappingA
CreateFileA
CreateEventA
PulseEvent
WriteFile
OpenMutexA
GetModuleFileNameA
GetWindowsDirectoryA
DisableThreadLibraryCalls
InterlockedIncrement
InterlockedDecrement
FreeLibraryAndExitThread
GetDriveTypeA
GetLogicalDriveStringsA
VirtualFree
VirtualProtect
VirtualAlloc
Process32Next
GetFileSize
CreateToolhelp32Snapshot
Module32Next
Module32First
GetCurrentProcessId
VirtualQuery
GetSystemInfo
GetProcAddress
Thread32Next
Thread32First
QueryDosDeviceA
OpenProcess
TerminateProcess
WideCharToMultiByte
lstrlenW
GetVersionExA
FindNextFileA
FindFirstFileA
MultiByteToWideChar
GetLastError
InterlockedPushEntrySList
InterlockedPopEntrySList
InitializeSListHead
CreateThread
WaitForSingleObject
GetTempPathA
GetTempFileNameA
CreateProcessA
Sleep
OpenEventA
WinExec
CopyFileA
CreateMutexA
LoadLibraryA
CloseHandle
Process32First
FreeLibrary
SetWindowsHookExA
GetDesktopWindow
SendMessageA
GetDlgItem
ShowWindow
IsWindow
EnumDesktopWindows
GetWindowTextA
GetClassNameA
GetClientRect
CallNextHookEx
GetDC
GetWindowDC
IsRectEmpty
EnumChildWindows
GetWindowThreadProcessId
UnhookWindowsHookEx
PrintWindow
GetWindowRect
EnumWindows
DeleteObject
DeleteDC
BitBlt
SelectObject
CreateCompatibleBitmap
GetDeviceCaps
CreateCompatibleDC
RegSetValueExA
RegCreateKeyExA
RegDeleteValueA
RegOpenKeyA
RegQueryValueExA
RegOpenKeyExA
RegEnumValueA
RegCloseKey
CoInitializeEx
CoInitialize
CreateStreamOnHGlobal
CoCreateInstance
SysFreeString
SysAllocString
SysStringLen
VariantClear
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?find@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDII@Z
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
HttpEndRequestA
InternetCloseHandle
InternetReadFile
HttpSendRequestA
HttpAddRequestHeadersA
HttpOpenRequestA
InternetConnectA
InternetOpenA
InternetCrackUrlA
HttpSendRequestExA
InternetWriteFile
DeleteUrlCacheEntry
URLDownloadToFileA
closesocket
setsockopt
WSACleanup
SHGetFolderPathA
GetProcessImageFileNameA
PathFileExistsA
_mbsupr
_CxxThrowException
_mbscmp
free
wcscmp
malloc
_mbsstr
memmove
_mbslwr
wcsstr
_mbsnbicmp
_snprintf
memset
_ismbcprint
_memicmp
memcmp
clock
_mbsrchr
_mbsnbcpy
_mbstok
_mbsicmp
abs
_ltoa
printf
_except_handler3
??1type_info@@UAE@XZ
__dllonexit
_onexit
_initterm
_adjust_fdiv
atoi
strlen
__CxxFrameHandler
strcat
strcpy
_mbschr
sprintf
??2@YAPAXI@Z
memcpy
GdipGetImageEncodersSize
GdiplusStartup
GdipDisposeImage
GdipSaveImageToStream
GdipCreateBitmapFromHBITMAP
GdipAlloc
GdipGetImageEncoders
GdipFree
GdipCloneImage
GetAdaptersInfo
UuidCreate
RpcStringFreeA
UuidToStringA
?GetOS@Utility@@SAKXZ
DUMMY
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ