CoGetComCatalog
GetRPCSSInfo
ServiceMain
WhichService
test
Static task
static1
Behavioral task
behavioral1
Sample
29e95a031d1af849acb96c5bf97d7378_JaffaCakes118.dll
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
29e95a031d1af849acb96c5bf97d7378_JaffaCakes118.dll
Resource
win10v2004-20240704-en
Target
29e95a031d1af849acb96c5bf97d7378_JaffaCakes118
Size
32KB
MD5
29e95a031d1af849acb96c5bf97d7378
SHA1
cb35cde6bfe5959a14607b3066d353ed09b295fe
SHA256
e58be8fa85cd48db1894b6637bea93ab35369c2a2b4adc37872245bf17fc2485
SHA512
6d74fe226c4c99fcf1ddb866d57ca8a16b22f121d426290e7620cc56fe2f0dc0430ec0d1120e667d03f483ed9ca66215731bd26af78adae89eb7226e0e50a9b3
SSDEEP
384:Jca0pbrqlefcrUi0W0qejdBehba1qjN5Pzz:Oa0dqsf0Ui0/7Ya1qjN1X
Checks for missing Authenticode signature.
resource |
---|
29e95a031d1af849acb96c5bf97d7378_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
WriteFile
CreateFileA
LoadResource
SizeofResource
FindResourceA
lstrlenA
Process32Next
lstrcmpiA
Process32First
CreateToolhelp32Snapshot
GetSystemDirectoryA
OpenProcess
GetCurrentProcessId
VirtualFreeEx
CreateRemoteThread
WriteProcessMemory
VirtualAllocEx
FindClose
FindNextFileA
lstrcpynA
lstrcpyA
WaitForSingleObject
FindFirstFileA
MultiByteToWideChar
SetFileTime
GetFileTime
CreateMutexA
CreateThread
ReleaseMutex
FreeLibrary
CreateEventA
GetLastError
SetEvent
CloseHandle
Sleep
CopyFileA
DeleteFileA
MoveFileExA
LoadLibraryA
GetProcAddress
lstrcmpA
GetModuleFileNameA
wsprintfA
RegOpenKeyA
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
RegSetValueExA
RegOpenKeyExA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegCloseKey
StrStrIA
PathFileExistsA
strcpy
strstr
strncat
strcat
strlen
memset
sprintf
CoGetComCatalog
GetRPCSSInfo
ServiceMain
WhichService
test
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ