DebugBreakpoint
DllCanUnloadNow
DllGetClassObject
Service
SpawnAndStart
Start
Uninstall
Behavioral task
behavioral1
Sample
2414b9996eee235b2abf59c1aad37692_JaffaCakes118.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2414b9996eee235b2abf59c1aad37692_JaffaCakes118.dll
Resource
win10v2004-20240508-en
Target
2414b9996eee235b2abf59c1aad37692_JaffaCakes118
Size
166KB
MD5
2414b9996eee235b2abf59c1aad37692
SHA1
f9dd2bcff7cdb508fa863c943639aaebff738970
SHA256
4145b7a1bb85dfc7c0c6ca809a1d046b27697417b10977504fb028246d7bf2c2
SHA512
5665b4ebe62c616dac0042ee32c70e8a268a7ea8e5982c77a0d712c6cfe3238fa2adc949d82487084ce2f6983b1c19e841ea812f0b465d52d2c6be24703027d9
SSDEEP
3072:WPapAVBf/22g/X5jgEq2jw370XB2nRnanAnmn4+uaLA9wPriEr9/TBfGOMWl:s3f2v5BqV370x2nRnanAnmn4PM/Ow9/N
resource | yara_rule |
---|---|
sample | upx |
Checks for missing Authenticode signature.
resource |
---|
2414b9996eee235b2abf59c1aad37692_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
MapViewOfFile
OpenEventA
ReadFile
ReleaseMutex
ResetEvent
SetEndOfFile
SetEvent
SetFilePointer
SetFileTime
SystemTimeToFileTime
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnmapViewOfFile
WaitForMultipleObjects
WaitForSingleObject
WideCharToMultiByte
WriteFile
MultiByteToWideChar
CreateThread
ExitThread
FreeLibrary
GetCurrentThreadId
GetTickCount
GlobalLock
GlobalSize
GlobalUnlock
HeapAlloc
IsBadReadPtr
SetErrorMode
HeapReAlloc
LoadLibraryA
GetEnvironmentVariableA
GetLocalTime
GetLocaleInfoA
GetWindowsDirectoryA
FileTimeToSystemTime
GetCurrentProcess
GetDiskFreeSpaceA
GetDriveTypeA
GetFileTime
GetLogicalDrives
SetFileAttributesA
CreatePipe
DuplicateHandle
GetExitCodeProcess
PeekNamedPipe
ResumeThread
TerminateProcess
TerminateThread
GlobalFree
lstrlenA
lstrcmpiA
Sleep
GetFileSize
FormatMessageA
GetFileType
GetPrivateProfileSectionA
MoveFileA
VirtualAlloc
VirtualFree
WritePrivateProfileSectionA
HeapFree
HeapDestroy
HeapCreate
GetVolumeInformationA
GetVersion
GetTimeZoneInformation
GetTempPathA
GetSystemTime
GetSystemDirectoryA
GetProcAddress
CloseHandle
GetModuleHandleA
GetModuleFileNameA
GetLastError
GetFileAttributesA
GetCurrentProcessId
FindNextFileA
FindFirstFileA
FindClose
DeleteFileA
CreateProcessA
CreateMutexA
CreateFileMappingA
CreateFileA
CreateEventA
HeapSize
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
RegEnumKeyExA
RegDeleteValueA
RegDeleteKeyA
RegCreateKeyExA
RegCloseKey
GetUserNameA
OleInitialize
OleUninitialize
CreateStreamOnHGlobal
GetHGlobalFromStream
CoInitialize
CoCreateInstance
StringFromGUID2
CoUninitialize
ShellExecuteA
GetClassNameA
GetClipboardData
GetMessageTime
GetParent
IsClipboardFormatAvailable
MsgWaitForMultipleObjects
OpenClipboard
PeekMessageA
PostMessageA
PostQuitMessage
RegisterClassA
SendMessageTimeoutA
SetWindowsHookExA
TranslateMessage
UnhookWindowsHookEx
UnregisterClassA
ExitWindowsEx
CharToOemBuffA
GetActiveWindow
SetClipboardData
EmptyClipboard
ShowWindow
SetFocus
SetForegroundWindow
GetFocus
AttachThreadInput
GetWindowThreadProcessId
GetForegroundWindow
SetWindowTextA
GetClientRect
SetWindowLongA
MoveWindow
SystemParametersInfoA
GetWindowLongA
LoadCursorA
EnumWindows
DispatchMessageA
DefWindowProcA
CreateWindowExA
CloseClipboard
CallNextHookEx
PostThreadMessageA
MessageBoxA
OemToCharBuffA
DestroyWindow
shutdown
gethostname
WSAAsyncSelect
WSAGetLastError
bind
connect
ioctlsocket
listen
recv
send
getsockname
inet_addr
closesocket
socket
inet_ntoa
WSAAsyncGetHostByAddr
WSAAsyncGetHostByName
WSACancelAsyncRequest
WSACleanup
WSAStartup
accept
DebugBreakpoint
DllCanUnloadNow
DllGetClassObject
Service
SpawnAndStart
Start
Uninstall
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE