AbbrevMonthName
DateAdd
DateDiff
DateSerial
Day
DayName
DllRegisterServer
DllUnregisterServer
FormatDateTime
Month
MonthName
Now
TimeSerial
Weekday
WeekdayName
Year
Static task
static1
Behavioral task
behavioral1
Sample
0701c025f84cc625ab5bb18d0089e9ba_JaffaCakes118.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
0701c025f84cc625ab5bb18d0089e9ba_JaffaCakes118.dll
Resource
win10v2004-20240611-en
Target
0701c025f84cc625ab5bb18d0089e9ba_JaffaCakes118
Size
85KB
MD5
0701c025f84cc625ab5bb18d0089e9ba
SHA1
81dd71e4d2e147e7264b7e67bcdc7b8602bd0d5e
SHA256
65dd8cdf808826e0292e8643de26ac045195b4296e80c590afdc6d8b352a1587
SHA512
84cc347a4c56e41a6e6e14560b24db4e8fe9606e67ca882538e51ac72af0febb10c0fdb9e3f99490dd69145d9ce2e5357c99995b93db60e2902e8ff5b6da9676
SSDEEP
1536:h4B8+Of4ug8GKTOH0MZJrNifY/TOMt7KNUuy/NxU4atVgBYexm:SBiQVLKTOH0MZJyQ3mUnlxUHgBYex
Checks for missing Authenticode signature.
resource |
---|
0701c025f84cc625ab5bb18d0089e9ba_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
IMAGE_FILE_DLL
RegCloseKey
RegCreateKeyExA
RegSetValueExA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
ImageList_Destroy
InitCommonControlsEx
BitBlt
CreateCompatibleBitmap
CreateCompatibleDC
CreateFontIndirectA
CreateSolidBrush
DeleteDC
DeleteObject
GetDeviceCaps
GetStockObject
GetTextMetricsA
SelectObject
SetBkColor
SetBkMode
SetTextAlign
SetTextColor
CloseHandle
CreateDirectoryA
CreateFileA
CreateProcessA
CreateThread
EnumResourceNamesA
ExitProcess
FindClose
FindFirstFileA
FindNextFileA
FreeEnvironmentStringsA
GetCommandLineA
GetCurrentProcess
GetCurrentThread
GetCurrentThreadId
GetEnvironmentStringsA
GetEnvironmentVariableA
GetExitCodeProcess
GetExitCodeThread
GetFileType
GetLastError
GetLocalTime
GetModuleHandleA
GetProcAddress
GetStartupInfoA
GetStringTypeA
GetThreadPriority
GetVersionExA
GetVolumeInformationA
GlobalAlloc
GlobalFree
GlobalReAlloc
LoadLibraryA
MultiByteToWideChar
OpenProcess
ReadFile
ResumeThread
SetEndOfFile
SetEnvironmentVariableA
SetErrorMode
SetFilePointer
SetLastError
SetThreadPriority
Sleep
SuspendThread
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
WaitForSingleObject
WideCharToMultiByte
WriteFile
CreateRemoteThread
GetDateFormatA
GetLocaleInfoA
GetTimeFormatA
VirtualAllocEx
WriteProcessMemory
CreateToolhelp32Snapshot
Process32First
Process32Next
Module32First
Module32Next
CLSIDFromProgID
CoCreateInstance
CoInitialize
CoTaskMemFree
CoUninitialize
ProgIDFromCLSID
GetActiveObject
SafeArrayCreate
SysAllocStringByteLen
SysFreeString
SysStringByteLen
VariantClear
VariantCopy
ShellExecuteA
CallWindowProcA
CharLowerBuffA
CharNextA
CharUpperBuffA
CheckRadioButton
ClientToScreen
CreateDialogIndirectParamA
CreateDialogParamA
CreateWindowExA
DestroyIcon
DestroyWindow
DispatchMessageA
EnableWindow
FillRect
GetClientRect
GetCursorPos
GetDC
GetDlgItem
GetMenu
GetMenuItemInfoA
GetSysColor
GetSysColorBrush
GetWindowLongA
GetWindowRect
GetWindowTextA
GetWindowTextLengthA
IsDialogMessageA
IsWindow
LoadImageA
MapDialogRect
PeekMessageA
PostMessageA
RedrawWindow
ReleaseDC
ScreenToClient
SendMessageA
SetFocus
SetForegroundWindow
SetWindowLongA
SetWindowPos
SetWindowTextA
ShowWindow
SystemParametersInfoA
TranslateMessage
DialogBoxParamA
accept
bind
closesocket
connect
gethostbyaddr
getservbyname
listen
recv
recvfrom
select
send
sendto
setsockopt
socket
WSAAsyncSelect
WSACleanup
WSAStartup
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
gethostbyname
gethostname
WSAGetLastError
inet_addr
SendARP
InternetConnectA
DeleteUrlCacheEntry
AbbrevMonthName
DateAdd
DateDiff
DateSerial
Day
DayName
DllRegisterServer
DllUnregisterServer
FormatDateTime
Month
MonthName
Now
TimeSerial
Weekday
WeekdayName
Year
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ