RaiseExsho
DzService
ServiceMain
Static task
static1
Behavioral task
behavioral1
Sample
077e17a2680f48fdb380b61b5eb38e59_JaffaCakes118.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
077e17a2680f48fdb380b61b5eb38e59_JaffaCakes118.dll
Resource
win10v2004-20240611-en
Target
077e17a2680f48fdb380b61b5eb38e59_JaffaCakes118
Size
90KB
MD5
077e17a2680f48fdb380b61b5eb38e59
SHA1
02180d2d6a4c8a5c4444db7bb0470f764da9955b
SHA256
142e0f6b7ac7889c4eaeb0a280efcaafd83f09a3caae49cc5ec7a8afd1f2547c
SHA512
8715c1056d6c8058bc9ac5d143e6665ae2e37c55dfe0bdd815dd10c7d14f45e38246303bc6322d862ac8a5edf9a8084797ce6d9253c54242ac98ac5d2a7428d8
SSDEEP
1536:+kHgpUK206cZpAelf8IZ4XyfuIXLr7r7n9Wt:B+UarAelEI+X0f9Wt
Checks for missing Authenticode signature.
resource |
---|
077e17a2680f48fdb380b61b5eb38e59_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
SendInput
SetCursorPos
GetThreadDesktop
OpenInputDesktop
OpenDesktopA
CallNextHookEx
GetForegroundWindow
UnhookWindowsHookEx
SetWindowsHookExW
GetWindowTextA
GetWindowThreadProcessId
wsprintfW
GetMessageA
GetActiveWindow
CharUpperA
PostThreadMessageA
EnumWindows
UpdateWindow
BringWindowToTop
ShowWindow
DestroyWindow
DispatchMessageA
SendMessageA
IsWindow
SetThreadDesktop
ExitWindowsEx
wsprintfA
PostMessageA
OpenWindowStationA
SetProcessWindowStation
CloseDesktop
CloseWindowStation
GetDeviceCaps
DeleteObject
CreateCompatibleBitmap
GetDIBits
DeleteDC
BitBlt
SelectObject
CreateCompatibleDC
CreateDCA
RegOpenKeyExA
CreateServiceA
RegisterServiceCtrlHandlerA
SetServiceStatus
LogonUserA
CreateProcessAsUserA
RegEnumValueA
RegEnumKeyExA
RegDeleteValueA
QueryServiceConfigA
EnumServicesStatusA
ChangeServiceConfigA
RegCreateKeyExA
RegSetValueExA
OpenProcessToken
StartServiceA
RegQueryValueExA
RegCloseKey
GetUserNameW
LookupPrivilegeValueA
ImpersonateSelf
OpenThreadToken
AdjustTokenPrivileges
OpenSCManagerA
DeleteService
ControlService
OpenServiceA
CloseServiceHandle
ShellExecuteA
SHFileOperationA
SHEmptyRecycleBinA
CreateStreamOnHGlobal
listen
setsockopt
bind
socket
closesocket
connect
send
ntohs
accept
WSAStartup
select
recv
inet_addr
gethostbyname
inet_ntoa
htons
getsockname
StrRChrA
StrChrA
StrStrA
StrCmpW
SHDeleteKeyA
StrCmpNIA
StrToIntA
GetModuleFileNameExA
ImmGetContext
ImmGetCompositionStringA
ImmGetCompositionStringW
ImmReleaseContext
capCreateCaptureWindowA
capGetDriverDescriptionA
waveInUnprepareHeader
waveInPrepareHeader
waveInAddBuffer
waveInStart
waveInStop
waveInClose
waveInOpen
__dllonexit
_onexit
_initterm
_adjust_fdiv
getenv
strrchr
malloc
wcscmp
free
strchr
_beginthread
__CxxFrameHandler
??2@YAPAXI@Z
??3@YAXPAX@Z
GetDriveTypeA
GetVolumeInformationA
GetDiskFreeSpaceExA
GetLogicalDriveStringsA
GetFileAttributesExA
FindClose
GetLastError
FindNextFileA
lstrcmpA
FindFirstFileA
lstrcmpiA
Process32Next
Process32First
CreateToolhelp32Snapshot
TerminateProcess
DuplicateHandle
SetStdHandle
CreatePipe
GetStdHandle
GetProcAddress
FreeLibrary
LocalAlloc
InterlockedExchange
RaiseException
MoveFileA
SetFilePointer
FlushFileBuffers
lstrlenW
lstrcatW
OpenEventA
OpenMutexA
GetFileSize
GlobalAlloc
GlobalLock
lstrcpyW
WaitForMultipleObjects
ResetEvent
ReleaseMutex
GlobalFree
CreateEventA
CreateMutexA
GetFileSizeEx
SetFilePointerEx
ReadFile
GetCurrentProcess
GetPriorityClass
GetThreadPriority
SetPriorityClass
SetThreadPriority
QueryPerformanceFrequency
QueryPerformanceCounter
GetVersion
GetVersionExA
GetSystemInfo
GlobalMemoryStatus
GetComputerNameA
GetACP
GetOEMCP
GetLocalTime
GetTempPathA
CreateDirectoryA
OpenProcess
GetModuleFileNameA
WideCharToMultiByte
LoadLibraryA
SearchPathA
GetCurrentThreadId
WriteFile
GetCurrentThread
GetCurrentProcessId
lstrlenA
DeviceIoControl
CreateFileA
CloseHandle
GetSystemDirectoryA
SetEvent
DeleteFileA
lstrcpyA
GetStartupInfoA
lstrcatA
CreateProcessA
Sleep
WaitForSingleObject
GetTickCount
RaiseExsho
DzService
ServiceMain
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ