DealA
DealB
DealC
Static task
static1
Behavioral task
behavioral1
Sample
0f0f3c02256a0495aab4fb84af87d20a_JaffaCakes118.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
0f0f3c02256a0495aab4fb84af87d20a_JaffaCakes118.dll
Resource
win10v2004-20240226-en
Target
0f0f3c02256a0495aab4fb84af87d20a_JaffaCakes118
Size
186KB
MD5
0f0f3c02256a0495aab4fb84af87d20a
SHA1
b31c3af512f70eeda2ea984a5320a1b210f6fad5
SHA256
5755e253172a2824440d23b7cc41a302b2500e78c08488022b166dc493fff917
SHA512
45940ece26dbb9bcc4d81c8b0cf98042e6d4baf2c18bf73eba11c668b8100f0920c1f23d9055149f3b8fda2fc5a79622525d6cc4284ca35cca4d3a6c56ff675e
SSDEEP
3072:ziM13TBRiOvlrXnRw8PLF9jZUgpN1KEX65u6NLGkA3+WFYxe6:zi2BRiOxXRw8rZUG7KEVOSkk+WFO7
Checks for missing Authenticode signature.
resource |
---|
0f0f3c02256a0495aab4fb84af87d20a_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_Xlen@std@@YAXXZ
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?substr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBE?AV12@II@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?find@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDII@Z
?erase@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@II@Z
?insert@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@IPBDI@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?rfind@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDII@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
SHSetValueA
SHGetValueA
SHDeleteValueA
strtok
_mkdir
__dllonexit
_onexit
_except_handler3
?terminate@@YAXXZ
_initterm
_adjust_fdiv
longjmp
__CxxLongjmpUnwind
_setjmp3
??1type_info@@UAE@XZ
wprintf
strncmp
_CxxThrowException
_stat
_strnicmp
_strlwr
time
__CxxFrameHandler
??2@YAPAXI@Z
strrchr
getenv
rand
srand
fwrite
fread
fclose
ftell
fseek
_stricmp
fopen
_access
sprintf
atoi
strstr
malloc
free
vsprintf
mktime
localtime
_mbsnbicmp
rename
_snprintf
printf
memmove
sscanf
atol
wcslen
wcscat
wcscpy
strncpy
isspace
abort
strchr
strftime
WSAStartup
sendto
socket
bind
recvfrom
htons
gethostname
gethostbyname
ntohl
inet_addr
ntohs
GetAdaptersInfo
RasGetEntryDialParamsA
RasEnumEntriesA
RasEnumConnectionsA
SetupDiGetClassDevsA
SetupDiEnumDeviceInfo
SetupDiGetDeviceRegistryPropertyA
SetupDiDestroyDeviceInfoList
SetupDiCallClassInstaller
SetupDiSetClassInstallParamsA
Netbios
GetUserNameA
LookupAccountNameA
ConvertSidToStringSidW
LsaOpenPolicy
LsaRetrievePrivateData
LsaClose
RegConnectRegistryA
RegOpenKeyA
RegEnumKeyA
StartServiceA
CreateServiceA
RegQueryInfoKeyA
RegEnumKeyExA
RegCreateKeyExA
RegSetValueExA
OpenSCManagerA
RegOpenKeyExW
RegQueryValueExW
OpenServiceA
ControlService
CloseServiceHandle
DeleteService
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
RegEnumValueA
GetSystemMetrics
CloseDesktop
CloseWindowStation
ReleaseDC
GetDC
SetThreadDesktop
OpenDesktopA
SetProcessWindowStation
wsprintfW
IsCharAlphaNumericA
DispatchMessageA
TranslateMessage
GetMessageA
SetTimer
CreateWindowExA
RegisterClassExA
SendMessageA
SetClipboardViewer
wsprintfA
ChangeClipboardChain
OpenWindowStationA
GetThreadDesktop
GetProcessWindowStation
CloseClipboard
GetWindowTextA
GetForegroundWindow
GetClipboardData
OpenClipboard
GetPriorityClipboardFormat
DefWindowProcA
PostQuitMessage
GetErrorInfo
VariantClear
VariantInit
CreateMutexA
GetModuleFileNameA
OutputDebugStringA
SetFileTime
LocalFileTimeToFileTime
GetFileTime
GetCurrentThreadId
GetExitCodeThread
WritePrivateProfileStringA
GetSystemDirectoryW
GetVolumeInformationW
GetDiskFreeSpaceExW
GetLogicalDrives
GetVolumeInformationA
GetDiskFreeSpaceExA
GetLogicalDriveStringsA
GetDriveTypeA
FileTimeToLocalFileTime
SetFileAttributesA
lstrcatA
lstrcpyA
SetFilePointer
GetWindowsDirectoryA
FindNextFileA
FindClose
GetCurrentProcessId
GetCurrentThread
GetCurrentProcess
CreateToolhelp32Snapshot
Process32First
Process32Next
GetSystemDefaultLCID
GetEnvironmentVariableA
WideCharToMultiByte
GetPrivateProfileIntA
GetPrivateProfileStringA
InterlockedCompareExchange
OpenProcess
TerminateProcess
CreatePipe
GetStartupInfoA
GetVersionExA
GetSystemDirectoryA
MoveFileExA
GetModuleHandleW
TerminateThread
LocalFree
LocalAlloc
lstrlenA
SetLastError
WriteFile
CreateFileW
MultiByteToWideChar
GetProcAddress
InterlockedIncrement
InterlockedDecrement
GetLocalTime
GetTempPathA
GetTickCount
FindFirstFileA
CopyFileA
DeleteFileA
MoveFileA
BeginUpdateResourceA
UpdateResourceA
EndUpdateResourceA
CloseHandle
CreateProcessA
Sleep
GetLastError
InterlockedExchange
FreeLibrary
SizeofResource
LockResource
LoadResource
FindResourceA
FileTimeToSystemTime
CreateThread
GlobalAlloc
GlobalLock
GlobalHandle
GlobalUnlock
GlobalFree
DeviceIoControl
GetFileSize
ReadFile
CreateFileA
SystemTimeToFileTime
LoadLibraryA
ord800
ord535
ord860
ord540
ord6877
ord2818
ord858
ord924
ord4129
ord5683
ord537
GetStockObject
SelectPalette
RealizePalette
GetDIBits
DeleteObject
DeleteDC
GetPixel
CreateDCA
CreateCompatibleDC
CreateCompatibleBitmap
SelectObject
BitBlt
GetDeviceCaps
SHGetSpecialFolderLocation
SHGetSpecialFolderPathA
SHGetPathFromIDListA
StgOpenStorage
StgIsStorageFile
CoUninitialize
CoTaskMemFree
CoInitialize
CoCreateInstance
DealA
DealB
DealC
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ