COMResModuleInstance
DriverProc
KsCreateAllocator
KsCreatePin
KsCreateTopologyNode
ServerMain
modMessage
modmCallback
Static task
static1
Behavioral task
behavioral1
Sample
0fa216a405299a4ef55644450dc07950_JaffaCakes118.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
0fa216a405299a4ef55644450dc07950_JaffaCakes118.dll
Resource
win10v2004-20240508-en
Target
0fa216a405299a4ef55644450dc07950_JaffaCakes118
Size
31KB
MD5
0fa216a405299a4ef55644450dc07950
SHA1
2d92685d2b544749a2c51f5bbd1521d641e6bbc8
SHA256
b1f9c9c5770a7abee698e2fc0421ae81693824ce47890b4fc8b9f0e59f168ee6
SHA512
c48f0163534e2434c0ee9207205830d0439d539e15e0cf0a2d7fc90564562c7bca0fd70df72549af9e071c9483e836a3e5b2d1e51247afafb38a9ffca822ad60
SSDEEP
768:3YqhbJptTphHr271mcY736vY9lwhhZLpoxwO:3YQbJfphK71g7qme/ng5
Checks for missing Authenticode signature.
resource |
---|
0fa216a405299a4ef55644450dc07950_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetFileSize
FreeLibrary
SetFilePointer
GetLastError
CreateEventA
GetModuleFileNameA
GetTempPathA
GetWindowsDirectoryA
Process32Next
Process32First
ReadFile
MoveFileExA
GetTempFileNameA
GetFileAttributesA
TerminateProcess
OpenProcess
SetFileAttributesA
CopyFileA
GetCommandLineA
ExitProcess
WaitForSingleObject
CreateThread
Sleep
GetSystemDirectoryA
MultiByteToWideChar
DeleteFileA
GlobalLock
CreateFileA
WriteFile
GlobalUnlock
GlobalFree
CloseHandle
LoadLibraryA
GetProcAddress
GetModuleHandleA
GlobalAlloc
CreateToolhelp32Snapshot
VirtualProtect
SetWindowLongA
RegisterShellHookWindow
RegisterWindowMessageA
EnumWindows
GetClassNameA
wsprintfA
GetClientRect
GetDesktopWindow
GetDC
GetWindowRect
GetParent
GetWindowThreadProcessId
ReleaseDC
GetWindowTextA
CallWindowProcA
CreateDCA
GetDeviceCaps
DeleteObject
BitBlt
SelectObject
CreateCompatibleBitmap
CreateCompatibleDC
GetDIBits
RealizePalette
SelectPalette
GetStockObject
GetObjectA
DeleteDC
GdiplusShutdown
GdipDisposeImage
GdipLoadImageFromFile
GdipGetImageEncoders
GdipGetImageEncodersSize
GdipFree
GdipAlloc
GdipCloneImage
GdiplusStartup
GdipSaveImageToFile
??0_Lockit@std@@QAE@XZ
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??0Init@ios_base@std@@QAE@XZ
??1Init@ios_base@std@@QAE@XZ
??0_Winit@std@@QAE@XZ
??1_Winit@std@@QAE@XZ
??1_Lockit@std@@QAE@XZ
connect
htons
gethostbyname
socket
recv
inet_ntoa
WSAStartup
send
WSACleanup
inet_addr
closesocket
GetModuleFileNameExA
InternetReadFile
InternetOpenUrlA
InternetOpenA
InternetCloseHandle
strrchr
_access
strcat
memset
strchr
atoi
strncpy
strcmp
__dllonexit
_onexit
_initterm
_adjust_fdiv
_stricmp
_strlwr
_getpid
_strrev
free
strstr
abs
sprintf
malloc
wcscmp
strcpy
strlen
??2@YAPAXI@Z
memcpy
__CxxFrameHandler
Netbios
COMResModuleInstance
DriverProc
KsCreateAllocator
KsCreatePin
KsCreateTopologyNode
ServerMain
modMessage
modmCallback
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ