ResetSSDT
ServiceMain
Static task
static1
Behavioral task
behavioral1
Sample
019b0ecf147c7259af8f4fe8a96055fc_JaffaCakes118.dll
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
019b0ecf147c7259af8f4fe8a96055fc_JaffaCakes118.dll
Resource
win10v2004-20240508-en
Target
019b0ecf147c7259af8f4fe8a96055fc_JaffaCakes118
Size
86KB
MD5
019b0ecf147c7259af8f4fe8a96055fc
SHA1
0444a8ee6c1f56dcfb8328178412a4a04d001f33
SHA256
158a5f2ac1752f5a3608aab7a916aa76fbca0f75eb6439c38114176dc16f5e3b
SHA512
b9e59d600fd84b3a53a6e75d75308b8ae344b48564d3e76eb3e7a739d149ab1380576b8694d174a05845ee0625891cf9f783e26dabfbc640860b7d2936b919e4
SSDEEP
1536:wB6u7g9Z9SXcoyEJoUcicOakfRys4DAZKC4sbsd:wBFgr9zPUTpaWRysqAZKC4sbi
Checks for missing Authenticode signature.
resource |
---|
019b0ecf147c7259af8f4fe8a96055fc_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
CreateProcessA
GetTempPathA
TerminateThread
MoveFileExA
GetTickCount
GetLocalTime
GetModuleHandleA
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalSize
GetStartupInfoA
CreatePipe
DisconnectNamedPipe
TerminateProcess
PeekNamedPipe
WaitForMultipleObjects
SizeofResource
GetFileAttributesA
FindResourceA
DeviceIoControl
LoadLibraryExA
OpenEventA
SetErrorMode
SetUnhandledExceptionFilter
FreeConsole
LocalSize
OpenProcess
Process32Next
Process32First
CreateToolhelp32Snapshot
GetCurrentProcess
lstrcmpiA
MoveFileA
LocalFree
FindClose
GetLogicalDriveStringsA
GetSystemDirectoryA
GetLastError
SetLastError
LoadResource
WriteFile
SetFilePointer
DeleteCriticalSection
VirtualFree
LeaveCriticalSection
EnterCriticalSection
VirtualAlloc
CreateEventA
CloseHandle
WaitForSingleObject
InitializeCriticalSection
lstrcpyA
ResetEvent
SetEvent
InterlockedExchange
CancelIo
Sleep
lstrlenA
GetPrivateProfileSectionNamesA
lstrcatA
GetWindowsDirectoryA
FreeLibrary
GetProcAddress
LoadLibraryA
MultiByteToWideChar
WideCharToMultiByte
lstrcmpA
GetPrivateProfileStringA
GetVersionExA
DeleteFileA
GetDriveTypeA
GetDiskFreeSpaceExA
GetVolumeInformationA
ReadFile
CreateFileA
GetFileSize
RemoveDirectoryA
LocalAlloc
FindFirstFileA
LocalReAlloc
GetCurrentThreadId
FindNextFileA
CreateWindowExA
PostMessageA
GetThreadDesktop
GetUserObjectInformationA
OpenInputDesktop
SetThreadDesktop
CloseDesktop
EnumWindows
GetWindowThreadProcessId
CloseWindow
GetProcessWindowStation
OpenWindowStationA
SetProcessWindowStation
CloseWindowStation
GetCursorPos
ReleaseDC
GetDesktopWindow
GetDC
GetSystemMetrics
SetRect
GetClipboardData
ExitWindowsEx
IsWindow
IsWindowVisible
wsprintfA
GetWindowTextA
GetActiveWindow
GetKeyNameTextA
GetFocus
CallNextHookEx
OpenDesktopA
SetWindowsHookExA
UnhookWindowsHookEx
SystemParametersInfoA
SendMessageA
keybd_event
OpenClipboard
EmptyClipboard
SetClipboardData
CloseClipboard
mouse_event
SetCursorPos
WindowFromPoint
SetCapture
MapVirtualKeyA
DeleteDC
SelectObject
GetPaletteEntries
CreateHalftonePalette
BitBlt
DeleteObject
CreateCompatibleDC
CreateDIBSection
GetTokenInformation
LookupAccountSidA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
SetServiceStatus
RegisterServiceCtrlHandlerExA
StartServiceA
OpenEventLogA
ClearEventLogA
CloseEventLog
RegQueryValueA
RegOpenKeyExA
RegOpenKeyA
RegQueryValueExA
RegCreateKeyA
RegSetValueExA
RegCloseKey
OpenSCManagerA
OpenServiceA
QueryServiceStatus
ControlService
DeleteService
CloseServiceHandle
LsaFreeMemory
LsaOpenPolicy
LsaRetrievePrivateData
LsaClose
LookupAccountNameA
IsValidSid
SHGetFileInfoA
SHGetSpecialFolderPathA
SHDeleteKeyA
_except_handler3
strncpy
strrchr
realloc
atoi
wcstombs
_beginthreadex
malloc
free
??1type_info@@UAE@XZ
_initterm
_adjust_fdiv
strchr
_CxxThrowException
??2@YAPAXI@Z
__CxxFrameHandler
_strcmpi
strstr
_ftol
ceil
memmove
calloc
??3@YAXPAX@Z
gethostname
connect
getsockname
WSACleanup
WSAStartup
htons
gethostbyname
ntohs
recv
setsockopt
send
select
closesocket
socket
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?_Xran@std@@YAXXZ
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_Refcnt@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEAAEPBD@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
MakeSureDirectoryPathExists
ImmGetContext
ImmGetCompositionStringA
ImmReleaseContext
InternetOpenUrlA
InternetReadFile
InternetCloseHandle
InternetOpenA
URLDownloadToFileA
capGetDriverDescriptionA
capCreateCaptureWindowA
EnumProcessModules
GetModuleFileNameExA
WTSFreeMemory
WTSQuerySessionInformationA
ResetSSDT
ServiceMain
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ