COMResModuleInstance
DriverProc
KsCreateAllocator
KsCreatePin
KsCreateTopologyNode
ServerMain
modMessage
modmCallback
Static task
static1
Behavioral task
behavioral1
Sample
2495452a32db59f9ee07be4c6d165faa_JaffaCakes118.dll
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
2495452a32db59f9ee07be4c6d165faa_JaffaCakes118.dll
Resource
win10v2004-20240611-en
Target
2495452a32db59f9ee07be4c6d165faa_JaffaCakes118
Size
32KB
MD5
2495452a32db59f9ee07be4c6d165faa
SHA1
198c37abc941036b2b6b4a6974a04c76bee8813c
SHA256
7896bb72fb6ffcd123fb5dcee0c9e7614f128e2e976f1f21f56950d2bcf8841f
SHA512
55dcadc8397544befe0d97e9fb55880d0778d3428ecd1d715f99b686a5f41ae08c8af914ba6b77b5c011cd5df384882dd80ae3b6dc15ea40efd2d4fb1250585c
SSDEEP
384:jpuj39NfuKDQ/BFgbpoVCl8zjOvyzJW77+1O+qXSQG9aFJFrRCRNYY4p:tujru/O2Ml8zCSW7ADMSZ96BURNYYk
Checks for missing Authenticode signature.
resource |
---|
2495452a32db59f9ee07be4c6d165faa_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
CreateThread
WaitForSingleObject
ReadFile
GetFileSize
SetFilePointer
GetLastError
CreateEventA
GetTempPathA
GetWindowsDirectoryA
GetSystemDirectoryA
SetFileAttributesA
GetCommandLineA
DeleteFileA
GlobalLock
CreateFileA
WriteFile
GlobalUnlock
GlobalFree
CloseHandle
LoadLibraryA
GetProcAddress
GlobalAlloc
VirtualProtect
Sleep
ExitProcess
MultiByteToWideChar
WideCharToMultiByte
GetModuleFileNameA
GetPrivateProfileStringA
RegisterShellHookWindow
RegisterWindowMessageA
SetWindowLongA
wsprintfA
CallWindowProcA
GetClassNameA
GetDesktopWindow
GetDC
GetWindowRect
GetParent
GetWindowThreadProcessId
EnumWindows
GetWindowTextA
ReleaseDC
GetClientRect
CreateDCA
GetDeviceCaps
DeleteObject
BitBlt
SelectObject
CreateCompatibleBitmap
CreateCompatibleDC
GetDIBits
RealizePalette
SelectPalette
GetStockObject
GetObjectA
DeleteDC
PathRemoveFileSpecA
GdiplusShutdown
GdipSaveImageToFile
GdiplusStartup
GdipGetImageEncoders
GdipGetImageEncodersSize
GdipFree
GdipAlloc
GdipCloneImage
GdipDisposeImage
GdipLoadImageFromFile
??1_Lockit@std@@QAE@XZ
??0_Lockit@std@@QAE@XZ
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??0Init@ios_base@std@@QAE@XZ
??1Init@ios_base@std@@QAE@XZ
??0_Winit@std@@QAE@XZ
??1_Winit@std@@QAE@XZ
connect
gethostbyname
inet_addr
socket
inet_ntoa
WSAStartup
recv
WSACleanup
htons
send
closesocket
InternetReadFile
InternetOpenUrlA
InternetOpenA
InternetCloseHandle
strrchr
memset
_access
strchr
strncpy
abs
malloc
wcscmp
??2@YAPAXI@Z
memcpy
free
__dllonexit
_onexit
_initterm
_adjust_fdiv
_getpid
_stricmp
_strlwr
_strrev
__CxxFrameHandler
strcmp
strlen
strstr
wcscpy
atoi
sprintf
strcpy
strcat
Netbios
COMResModuleInstance
DriverProc
KsCreateAllocator
KsCreatePin
KsCreateTopologyNode
ServerMain
modMessage
modmCallback
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ