EndWork
Runing
ServiceMain
Working
aaaaaa
bbbbbbb
Static task
static1
Behavioral task
behavioral1
Sample
01567c68c7e91911844e6a3f9ddb5ba3_JaffaCakes118.dll
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
01567c68c7e91911844e6a3f9ddb5ba3_JaffaCakes118.dll
Resource
win10v2004-20240611-en
Target
01567c68c7e91911844e6a3f9ddb5ba3_JaffaCakes118
Size
132KB
MD5
01567c68c7e91911844e6a3f9ddb5ba3
SHA1
535997c0787400a10070c25571289326d30c1fd9
SHA256
a0966e1568aceb31d706b0fff6221b81a3583043f7df1a947209a904155bdc27
SHA512
6f0754c6517544035a5cb2ca268969943e2d1295b7d468409da68ea9cc3a129ced2b836603745a4881d58528b1e3f21878cef18e7d88d0c3093ea6729a297fce
SSDEEP
3072:RJfFFvWCaOvGUm0CbPmk7I4uSxRndpzw:raCqU/QtIPsRdpzw
Checks for missing Authenticode signature.
resource |
---|
01567c68c7e91911844e6a3f9ddb5ba3_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetVolumeInformationA
GetLogicalDriveStringsA
FindClose
LocalFree
FindNextFileA
LocalAlloc
GetFileSize
ReadFile
SetFilePointer
MoveFileA
lstrcmpiA
MapViewOfFile
CreateFileMappingA
HeapFree
UnmapViewOfFile
GetModuleHandleA
GlobalFree
GetDiskFreeSpaceExA
GlobalLock
GlobalAlloc
GetStartupInfoA
WaitForMultipleObjects
TerminateProcess
GlobalMemoryStatus
GetVersionExA
OpenEventA
SetErrorMode
GetCurrentProcess
GetWindowsDirectoryA
SetFileAttributesA
CopyFileA
ExpandEnvironmentStringsA
GetModuleFileNameA
CreateFileA
GetDriveTypeA
lstrlenA
GetProcAddress
lstrcpyA
GetFileAttributesA
CreateDirectoryA
DeleteFileA
GetProcessHeap
HeapAlloc
GetCurrentProcessId
GetLocalTime
GetTickCount
CancelIo
InterlockedExchange
ResetEvent
GetLastError
VirtualAlloc
EnterCriticalSection
LeaveCriticalSection
VirtualFree
DeleteCriticalSection
ResumeThread
SetEvent
WaitForSingleObject
Sleep
TerminateThread
CloseHandle
FreeLibrary
LoadLibraryA
GlobalUnlock
LoadIconA
RegisterClassA
LoadMenuA
CreateWindowExA
IsWindow
SendMessageA
PostMessageA
OpenDesktopA
GetThreadDesktop
OpenInputDesktop
IsWindowVisible
GetWindowThreadProcessId
ExitWindowsEx
GetCursorInfo
GetCursorPos
ReleaseDC
GetDesktopWindow
GetDC
SetRect
GetSystemMetrics
GetClipboardData
OpenClipboard
EmptyClipboard
SetClipboardData
CloseClipboard
SetCursorPos
WindowFromPoint
SetCapture
mouse_event
MapVirtualKeyA
LoadCursorA
MessageBoxA
DispatchMessageA
TranslateMessage
GetMessageA
CharNextA
wsprintfA
GetWindowTextA
CloseWindow
GetStockObject
RegRestoreKeyA
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
CloseEventLog
ClearEventLogA
OpenEventLogA
RegSetValueExA
RegCreateKeyExA
OpenSCManagerA
FreeSid
SetSecurityDescriptorDacl
AddAccessAllowedAce
InitializeAcl
GetLengthSid
AllocateAndInitializeSid
InitializeSecurityDescriptor
RegOpenKeyA
UnlockServiceDatabase
ChangeServiceConfig2A
LockServiceDatabase
StartServiceA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegSaveKeyA
RegDeleteKeyA
SHGetSpecialFolderPathA
putchar
memmove
__CxxFrameHandler
memcpy
puts
memcmp
_CxxThrowException
rand
strcpy
sprintf
strncpy
free
malloc
_except_handler3
_stricmp
strcat
strrchr
_beginthreadex
atoi
wcstombs
_access
srand
calloc
??1type_info@@UAE@XZ
_initterm
_adjust_fdiv
ceil
_ftol
strlen
strcmp
_strrev
strstr
??3@YAXPAX@Z
??2@YAPAXI@Z
memset
recv
select
closesocket
send
inet_addr
connect
sendto
WSASocketA
htonl
getsockname
gethostbyname
htons
setsockopt
WSAIoctl
WSACleanup
WSAStartup
socket
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBDABV?$allocator@D@1@@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?c_str@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEPBDXZ
EndWork
Runing
ServiceMain
Working
aaaaaa
bbbbbbb
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ