COMResModuleInstance
DriverProc
KsCreateAllocator
KsCreatePin
KsCreateTopologyNode
ServerMain
modMessage
modmCallback
Static task
static1
Behavioral task
behavioral1
Sample
226385ea8fdb80ae981ac518099a510e_JaffaCakes118.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
226385ea8fdb80ae981ac518099a510e_JaffaCakes118.dll
Resource
win10v2004-20240508-en
Target
226385ea8fdb80ae981ac518099a510e_JaffaCakes118
Size
34KB
MD5
226385ea8fdb80ae981ac518099a510e
SHA1
8c95c389a1679e88ee06313ff8deea9d4383f9dd
SHA256
8fd974183d459fabc9ae57f76ea60eddc56df55b03d65bf9fa42797a84d6b241
SHA512
399cd6253c6112aebef40f14b804ddbed3904689ec59a861b143a50a9cc571eccd5fa291154483eb6c2a23b23d521f7e5a820dfd1257c25b3e3ec20553230893
SSDEEP
768:LviFJF39gntZVBprYEDUSrZtHQ7cl5qgIN/ndRP5vX8:LQJF3+7Lr6SrTw7cl5M/dRP5vs
Checks for missing Authenticode signature.
resource |
---|
226385ea8fdb80ae981ac518099a510e_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GlobalLock
DeleteFileA
MultiByteToWideChar
CreateThread
WaitForSingleObject
ReadFile
GetFileSize
SetFilePointer
GetLastError
CreateEventA
GetModuleFileNameA
GetWindowsDirectoryA
CreateFileA
SetFileAttributesA
CreateMutexA
WriteFile
GlobalUnlock
GlobalFree
CloseHandle
LoadLibraryA
GetProcAddress
GlobalAlloc
VirtualProtect
GetModuleHandleA
Sleep
ExitProcess
WideCharToMultiByte
GetCommandLineA
GetTempPathA
GetPrivateProfileStringA
GetSystemDirectoryA
WritePrivateProfileStringA
EnumWindows
wsprintfA
GetWindowThreadProcessId
ReleaseDC
GetWindowRect
GetDC
GetDesktopWindow
GetClientRect
CallWindowProcA
GetClassNameA
SetWindowLongA
RegisterShellHookWindow
GetWindowTextA
GetParent
RegisterWindowMessageA
CreateDCA
GetDeviceCaps
DeleteObject
BitBlt
SelectObject
CreateCompatibleBitmap
CreateCompatibleDC
GetDIBits
RealizePalette
SelectPalette
GetStockObject
GetObjectA
DeleteDC
GdipCloneImage
GdipAlloc
GdipFree
GdipGetImageEncodersSize
GdiplusStartup
GdipSaveImageToFile
GdiplusShutdown
GdipDisposeImage
GdipGetImageEncoders
GdipLoadImageFromFile
URLDownloadToFileA
??0_Lockit@std@@QAE@XZ
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??0Init@ios_base@std@@QAE@XZ
??1Init@ios_base@std@@QAE@XZ
??0_Winit@std@@QAE@XZ
??1_Winit@std@@QAE@XZ
??1_Lockit@std@@QAE@XZ
inet_ntoa
send
recv
socket
inet_addr
htons
connect
closesocket
gethostbyname
WSACleanup
WSAStartup
InternetOpenUrlA
InternetCloseHandle
InternetReadFile
InternetOpenA
strrchr
_access
strchr
strncpy
abs
malloc
wcscmp
??2@YAPAXI@Z
strcmp
__dllonexit
_onexit
_initterm
_adjust_fdiv
_stricmp
_getpid
_strlwr
_strrev
free
__CxxFrameHandler
atoi
strtok
memset
strcat
fopen
fgets
strstr
strcpy
strlen
memcpy
sprintf
Netbios
COMResModuleInstance
DriverProc
KsCreateAllocator
KsCreatePin
KsCreateTopologyNode
ServerMain
modMessage
modmCallback
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ