BITSAlloc
BITSFree
BITSServiceMain
BytesRemainingInCurrentRange
CNestedImpersonation
CalculateBytesTotal
DllRegisterServer
DllUnregisterServer
EmptyString
Find
FindInterfaceIndex
GetSubRanges
HostFromProxyDescription
MyLive
PROXY_SETTINGS_CONTAINER
Static task
static1
Behavioral task
behavioral1
Sample
26ac1678050fa4146768fb8be7b0e087_JaffaCakes118.dll
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
26ac1678050fa4146768fb8be7b0e087_JaffaCakes118.dll
Resource
win10v2004-20240704-en
Target
26ac1678050fa4146768fb8be7b0e087_JaffaCakes118
Size
99KB
MD5
26ac1678050fa4146768fb8be7b0e087
SHA1
c6a1f22e6afa96510d44f7d6095acae5a7e74271
SHA256
a763a1fd26613054c0be1f277ba42f1b1137012ed7836dbc2d9f0200edb3fb22
SHA512
54b37e25aaab1ab0ac759220bcb75016ff6590762204407dd959be80c14259905716dd44461cffd5ab08d7df5bcc1a5df3dc8a093e880938bae76a1486a8af79
SSDEEP
1536:Wbof0dxbkrgl8iQ5nkfepZXuXs+UlGVIeckX0fLFOth/2h6gJrmaK3:Wbvd1krgeVRZSIeDXmLFOth/2h6gJr23
Checks for missing Authenticode signature.
resource |
---|
26ac1678050fa4146768fb8be7b0e087_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
InitializeCriticalSection
DeleteCriticalSection
VirtualFree
GetProcAddress
LoadLibraryA
VirtualAlloc
WaitForSingleObject
ResetEvent
SetEvent
InterlockedExchange
CancelIo
Sleep
lstrlenA
GetPrivateProfileSectionNamesA
FreeLibrary
MultiByteToWideChar
WideCharToMultiByte
lstrcmpA
GetPrivateProfileStringA
GetVersionExA
DeleteFileA
GetLastError
CreateProcessA
GetDiskFreeSpaceExA
FindClose
LocalFree
LocalReAlloc
LocalAlloc
RemoveDirectoryA
CreateFileA
ReadFile
WriteFile
MoveFileA
SetLastError
GetCurrentProcess
CreateRemoteThread
VirtualAllocEx
TerminateThread
GetLocalTime
GetTickCount
GlobalUnlock
GetSystemInfo
lstrcpyA
CloseHandle
RaiseException
memset
??2@YAPAXI@Z
memcmp
strchr
malloc
strcpy
strcmp
free
_except_handler3
strrchr
strcat
__CxxFrameHandler
atoi
strncmp
_errno
strtok
strncat
realloc
sprintf
wcstombs
_beginthreadex
calloc
??1type_info@@UAE@XZ
strstr
strlen
_ftol
ceil
memmove
memcpy
strncpy
_strnicmp
??3@YAXPAX@Z
_strcmpi
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
ICOpen
ICClose
ICCompressorFree
ICSeqCompressFrameEnd
ICSendMessage
ICSeqCompressFrame
ICSeqCompressFrameStart
BITSAlloc
BITSFree
BITSServiceMain
BytesRemainingInCurrentRange
CNestedImpersonation
CalculateBytesTotal
DllRegisterServer
DllUnregisterServer
EmptyString
Find
FindInterfaceIndex
GetSubRanges
HostFromProxyDescription
MyLive
PROXY_SETTINGS_CONTAINER
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ