ServiceRouteExA
StartServiceEx
StopServiceEx
UnHookAPI
Static task
static1
Behavioral task
behavioral1
Sample
1807bed87cab57b0359662e05560d9ef_JaffaCakes118.dll
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
1807bed87cab57b0359662e05560d9ef_JaffaCakes118.dll
Resource
win10v2004-20240611-en
Target
1807bed87cab57b0359662e05560d9ef_JaffaCakes118
Size
14KB
MD5
1807bed87cab57b0359662e05560d9ef
SHA1
48e96dd03eca9600a4eddc6050b3cd928f0a5d0e
SHA256
f56317cf267ef305d890fd98823e9d01bf510df37e360020fa0a4e6395720291
SHA512
0a1a0c1742d9d5481c9275b8a890569f6ad7fa2adbfbf85f529612806ae4a8ed4d3f0875448a3b12d36b63eacee8cbfd4d860622f6e93ef5663fc78cd53f7240
SSDEEP
192:SyJ9c4WBWiQMo6EoIyg94+0uBBQ6PRQkzVPtlRO:P9oBzQgVxuBBQARQkZPti
Checks for missing Authenticode signature.
resource |
---|
1807bed87cab57b0359662e05560d9ef_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
strlen
memcpy
memcmp
RtlZeroMemory
closesocket
gethostname
LoadLibraryA
EnterCriticalSection
DeleteCriticalSection
CreateThread
lstrlenA
lstrcpyA
lstrcmpiA
lstrcmpA
WaitForSingleObject
TerminateThread
Sleep
LeaveCriticalSection
CloseHandle
CreateFileA
GetExitCodeThread
GetFileSize
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GlobalAlloc
GlobalFree
lstrcatA
ReadFile
VirtualProtectEx
InitializeCriticalSection
CallNextHookEx
SetWindowsHookExA
UnhookWindowsHookEx
wsprintfA
ServiceRouteExA
StartServiceEx
StopServiceEx
UnHookAPI
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ