COMResModuleInstance
DriverProc
KsCreateAllocator
KsCreatePin
KsCreateTopologyNode
ServerMain
modMessage
modmCallback
Static task
static1
Behavioral task
behavioral1
Sample
080dad143a127ffd4971bc0fa60386fc_JaffaCakes118.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
080dad143a127ffd4971bc0fa60386fc_JaffaCakes118.dll
Resource
win10v2004-20240508-en
Target
080dad143a127ffd4971bc0fa60386fc_JaffaCakes118
Size
30KB
MD5
080dad143a127ffd4971bc0fa60386fc
SHA1
5440baebcf34b5f08d0fa2d713000a9929197d6c
SHA256
c7626530923212ea78272dacf32e4860c0df005d0ca632483b4d942bef143de8
SHA512
7f498c69838237606cf1cc099b6602104742c187e2660b9baa77d6d67b730eefedee48d50caad21294635dc289a8be94ed7e72dbe5d1ead251192ffb85229a15
SSDEEP
768:MPrLlG1Q2UJIvT3QI/Av9Rb0o7K5PYhOUhvVL13:MjLlYvT3x/AvN7KCrNj3
Checks for missing Authenticode signature.
resource |
---|
080dad143a127ffd4971bc0fa60386fc_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetFileSize
FreeLibrary
SetFilePointer
GetLastError
CreateEventA
GetModuleFileNameA
GetTempPathA
GetWindowsDirectoryA
Process32Next
ReadFile
CreateToolhelp32Snapshot
MoveFileExA
GetTempFileNameA
GetFileAttributesA
TerminateProcess
OpenProcess
SetFileAttributesA
CopyFileA
GetCommandLineA
CreateThread
Sleep
GetSystemDirectoryA
MultiByteToWideChar
DeleteFileA
GlobalLock
CreateFileA
WriteFile
GlobalUnlock
GlobalFree
CloseHandle
LoadLibraryA
GetProcAddress
GetModuleHandleA
GlobalAlloc
VirtualProtect
Process32First
ExitProcess
GetClassNameA
SetWindowLongA
RegisterShellHookWindow
RegisterWindowMessageA
CallWindowProcA
wsprintfA
GetDesktopWindow
GetDC
GetWindowRect
ReleaseDC
GetParent
GetWindowThreadProcessId
EnumWindows
GetWindowTextA
GetClientRect
CreateDCA
GetDeviceCaps
DeleteObject
BitBlt
SelectObject
CreateCompatibleBitmap
CreateCompatibleDC
GetDIBits
RealizePalette
SelectPalette
GetStockObject
GetObjectA
DeleteDC
GdiplusShutdown
GdipDisposeImage
GdipSaveImageToFile
GdipGetImageEncoders
GdipGetImageEncodersSize
GdipFree
GdipAlloc
GdipCloneImage
GdiplusStartup
GdipLoadImageFromFile
??0_Lockit@std@@QAE@XZ
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??0Init@ios_base@std@@QAE@XZ
??1Init@ios_base@std@@QAE@XZ
??0_Winit@std@@QAE@XZ
??1_Winit@std@@QAE@XZ
??1_Lockit@std@@QAE@XZ
connect
htons
gethostbyname
socket
recv
inet_ntoa
WSAStartup
send
WSACleanup
inet_addr
closesocket
GetModuleFileNameExA
InternetReadFile
InternetOpenUrlA
InternetOpenA
InternetCloseHandle
strrchr
_access
strcat
memset
strchr
strncpy
abs
malloc
free
__dllonexit
_onexit
_initterm
_adjust_fdiv
_getpid
_stricmp
_strlwr
_strrev
wcscmp
??2@YAPAXI@Z
memcpy
__CxxFrameHandler
strcmp
strstr
atoi
sprintf
strlen
strcpy
Netbios
COMResModuleInstance
DriverProc
KsCreateAllocator
KsCreatePin
KsCreateTopologyNode
ServerMain
modMessage
modmCallback
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ