GetModuleId
GetModuleVersion
ModuleStartup
OnKernelEventReceived
Static task
static1
Behavioral task
behavioral1
Sample
213d9d92bb8f88d00821ccb793ad33ee_JaffaCakes118.dll
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
213d9d92bb8f88d00821ccb793ad33ee_JaffaCakes118.dll
Resource
win10v2004-20240611-en
Target
213d9d92bb8f88d00821ccb793ad33ee_JaffaCakes118
Size
28KB
MD5
213d9d92bb8f88d00821ccb793ad33ee
SHA1
94894ac055e022ee9f5dffc6be99cbffd61e24e0
SHA256
51a59cacf598a22ef66297fa2cb8de84930c3fc4b1de529666b732a10a1b3248
SHA512
fb484ebaf3163ef984aa4a931ae62c9c1e7975bac0941f802797857c8ad818689be8e84118d4af86e28e2ceb9d19ce96eb6d19d0a43ed5cd86867720076f0025
SSDEEP
192:alrsTl0Rx/hBd5TcPg/vqH9sRJ5nTnoaynypcVo9i:aW29aQbRJ5TnoPyqC9
Checks for missing Authenticode signature.
resource |
---|
213d9d92bb8f88d00821ccb793ad33ee_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
ord4486
ord2554
ord2512
ord5731
ord3922
ord1089
ord5199
ord2396
ord3346
ord5300
ord5302
ord2725
ord4079
ord4698
ord5307
ord5289
ord5714
ord2982
ord3147
ord3259
ord4465
ord3136
ord3262
ord2985
ord3081
ord2976
ord3830
ord3831
ord3825
ord3079
ord4080
ord926
ord6375
ord3738
ord561
ord815
ord3663
ord825
ord5450
ord6394
ord823
ord5440
ord6383
ord535
ord3584
ord543
ord803
ord1116
ord1176
ord1575
ord1168
ord1577
ord1182
ord342
ord1243
ord1197
ord1570
ord1253
ord1255
ord1578
ord600
ord826
ord269
ord858
ord860
ord538
ord6467
ord1247
ord1105
ord537
ord941
ord4202
ord924
ord2764
ord2915
ord4424
ord5572
ord4274
ord800
ord4622
ord540
strlen
memset
_adjust_fdiv
_ftol
strcmp
memcpy
mbstowcs
rand
malloc
_stricmp
_EH_prolog
__CxxFrameHandler
_initterm
free
??1type_info@@UAE@XZ
_onexit
__dllonexit
LocalFree
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
GetSystemDirectoryA
GetWindowsDirectoryA
TerminateThread
Sleep
CopyFileA
LocalAlloc
wsprintfA
CloseServiceHandle
CreateServiceA
OpenServiceA
OpenSCManagerA
StartServiceA
gethostname
NetApiBufferFree
NetShareEnum
NetUseAdd
WNetEnumResourceA
WNetCloseEnum
WNetOpenEnumA
PathFileExistsA
GetModuleId
GetModuleVersion
ModuleStartup
OnKernelEventReceived
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ