CodeDLL
Fuck360
PassWordA
PassWordB
ServerDll
UsernameA
main
Static task
static1
Behavioral task
behavioral1
Sample
1b577cbfbb7803782cb64bceb2d18978_JaffaCakes118.dll
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
1b577cbfbb7803782cb64bceb2d18978_JaffaCakes118.dll
Resource
win10v2004-20240508-en
Target
1b577cbfbb7803782cb64bceb2d18978_JaffaCakes118
Size
128KB
MD5
1b577cbfbb7803782cb64bceb2d18978
SHA1
7f5ce9f9b27613089b7bb4ebdc83daab4f6da40f
SHA256
c679240d824319f2d0fabb060f97ad6c8e8da4cdbf93e1c9412be01e356141a7
SHA512
847d9301e40c93e4450e15049147e1801f6a0b7ed07cfefe412e0aec45957c3e715684dcc8b042d4d174144d8fa458e2ac778a2e7f9dc891411f5be0c892b928
SSDEEP
3072:OX9TxJhVm6PFDC9heX5Ujhqu1tGfYatpAvyrwPZuti:OXMF6U15tGAMpAvgwPZB
Checks for missing Authenticode signature.
resource |
---|
1b577cbfbb7803782cb64bceb2d18978_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
CloseHandle
GetProcAddress
LoadLibraryA
SetEvent
ResumeThread
CreateThread
CreateEventA
DeleteCriticalSection
lstrcpyA
ResetEvent
GetVersionExA
lstrcatA
FreeLibrary
GetDriveTypeA
GetLogicalDriveStringsA
LocalReAlloc
RemoveDirectoryA
DeleteFileA
GetFileSize
CreateFileA
ReadFile
WriteFile
MoveFileA
GetLastError
CreateDirectoryA
SetLastError
GetFileAttributesA
GetModuleFileNameA
GetCurrentProcess
OpenProcess
ExitThread
GetTickCount
HeapFree
GetProcessHeap
HeapAlloc
UnmapViewOfFile
LocalAlloc
lstrlenA
SetFilePointer
GetLocalTime
GlobalFree
GlobalLock
GlobalAlloc
GlobalUnlock
GlobalSize
WaitForMultipleObjects
GetStartupInfoA
CreatePipe
DisconnectNamedPipe
PeekNamedPipe
GetSystemInfo
ReleaseMutex
OpenEventA
SetErrorMode
CreateMutexA
SetUnhandledExceptionFilter
Sleep
FindFirstFileA
CopyFileA
GetSystemDirectoryA
FreeConsole
GetCurrentThreadId
RaiseException
InterlockedExchange
_CxxThrowException
memcmp
strcpy
strchr
strcmp
malloc
strcat
free
_except_handler3
strrchr
strncpy
strncmp
sprintf
atoi
_errno
strstr
rand
srand
time
strncat
realloc
wcstombs
_beginthreadex
calloc
??1type_info@@UAE@XZ
_initterm
_adjust_fdiv
strlen
_ftol
ceil
memmove
__CxxFrameHandler
_snprintf
??2@YAPAXI@Z
_strupr
_strnicmp
_strnset
_strrev
??3@YAXPAX@Z
memcpy
memset
_strcmpi
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
ICSeqCompressFrameEnd
ICCompressorFree
ICClose
ICOpen
ICSendMessage
ICSeqCompressFrameStart
ICSeqCompressFrame
CodeDLL
Fuck360
PassWordA
PassWordB
ServerDll
UsernameA
main
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ