COMResModuleInstance
DriverProc
KsCreateAllocator
KsCreatePin
KsCreateTopologyNode
ServerMain
modMessage
modmCallback
Static task
static1
Behavioral task
behavioral1
Sample
0994a72cd52e8163d9d0de4777101b4a_JaffaCakes118.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
0994a72cd52e8163d9d0de4777101b4a_JaffaCakes118.dll
Resource
win10v2004-20240508-en
Target
0994a72cd52e8163d9d0de4777101b4a_JaffaCakes118
Size
40KB
MD5
0994a72cd52e8163d9d0de4777101b4a
SHA1
b65673367d0e5f682a028fd40c9f2f47bf6d1a7a
SHA256
c6ae5859c2fbd5a3e18f80b3348dc58003690a9d2077a4409829522def036bb5
SHA512
8197e26ddc79c4cbe364cc8413f798fee4462d7ac992ec6ba838e464d0ca836d360f7880b09b4de92c0bd501bf176f29188603c69fcf269f5dcf9c18086fbec2
SSDEEP
768:5txDF/iGRRK3wj3vwE97WRD6f7mWjJ3WBiRiKlM:5txDF/iG3fj3Ys7W56fV1aiRiKa
Checks for missing Authenticode signature.
resource |
---|
0994a72cd52e8163d9d0de4777101b4a_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
DeleteFileA
CreateThread
WaitForSingleObject
ReadFile
GetFileSize
SetFilePointer
GetLastError
CreateEventA
GetModuleFileNameA
GetTempPathA
GetWindowsDirectoryA
GlobalLock
SetFileAttributesA
GetCommandLineA
CreateFileA
WriteFile
GlobalUnlock
GlobalFree
CloseHandle
LoadLibraryA
GetProcAddress
GlobalAlloc
VirtualProtect
Sleep
CreateProcessA
ExitProcess
MultiByteToWideChar
WideCharToMultiByte
GetPrivateProfileStringA
GetSystemDirectoryA
WritePrivateProfileStringA
GetWindowTextA
GetParent
GetWindowThreadProcessId
wsprintfA
EnumWindows
ReleaseDC
GetWindowRect
GetDC
GetDesktopWindow
GetClientRect
CallWindowProcA
GetClassNameA
SetWindowLongA
RegisterShellHookWindow
RegisterWindowMessageA
CreateDCA
GetDeviceCaps
DeleteObject
BitBlt
SelectObject
CreateCompatibleBitmap
CreateCompatibleDC
GetDIBits
RealizePalette
SelectPalette
GetStockObject
GetObjectA
DeleteDC
GdipCloneImage
GdipAlloc
GdipFree
GdipGetImageEncodersSize
GdipGetImageEncoders
GdiplusStartup
GdipDisposeImage
GdiplusShutdown
GdipLoadImageFromFile
GdipSaveImageToFile
??0_Lockit@std@@QAE@XZ
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??0Init@ios_base@std@@QAE@XZ
??1Init@ios_base@std@@QAE@XZ
??0_Winit@std@@QAE@XZ
??1_Winit@std@@QAE@XZ
??1_Lockit@std@@QAE@XZ
inet_ntoa
send
recv
socket
inet_addr
htons
connect
closesocket
gethostbyname
WSACleanup
WSAStartup
InternetOpenA
InternetReadFile
InternetOpenUrlA
InternetCloseHandle
strrchr
_access
strchr
strncpy
strstr
abs
malloc
__dllonexit
_onexit
_initterm
_adjust_fdiv
_strlwr
_getpid
_stricmp
_strrev
free
wcscmp
memcpy
__CxxFrameHandler
sscanf
swprintf
strlen
??2@YAPAXI@Z
atoi
memset
sprintf
strcat
strcpy
strcmp
Netbios
COMResModuleInstance
DriverProc
KsCreateAllocator
KsCreatePin
KsCreateTopologyNode
ServerMain
modMessage
modmCallback
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ