SchedServiceMain
ServiceMain
SvchostEntry_W32Time
abc
explore
Static task
static1
Behavioral task
behavioral1
Sample
2de32cfd68a04245a35573932091685b_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2de32cfd68a04245a35573932091685b_JaffaCakes118.dll
Resource
win10v2004-20240704-en
Target
2de32cfd68a04245a35573932091685b_JaffaCakes118
Size
181KB
MD5
2de32cfd68a04245a35573932091685b
SHA1
36438aebcea413e6ec2d7ebcc54552ecef96c4d2
SHA256
906b2410c4086845831bf194ff8b393ca33ca8c435159c5f6e064a5e795bf0e7
SHA512
0925cb238d136aeb47ef5acc9d474959dee981094ece34417e49482a4c95e1e597e07fcb7856ee6c5e5c5adaa12b614096ee4acdee12c72cb79c55172d8f6293
SSDEEP
3072:lX8IvZn1VIPjATaOw89v3jLJynZcgjdBI4CU9H/tou6BA8o3BZT9G1Mk:lXBvZnLRJwcv3jtEBIxUpfoo34
Checks for missing Authenticode signature.
resource |
---|
2de32cfd68a04245a35573932091685b_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
UnmapViewOfFile
GetVersionExA
lstrcpyA
LeaveCriticalSection
WaitForSingleObject
GlobalAlloc
EnterCriticalSection
LoadLibraryA
InitializeCriticalSection
CreateFileMappingA
CreateFileA
CreateRemoteThread
GetModuleHandleA
WriteProcessMemory
GetSystemTime
lstrcatA
DeviceIoControl
lstrcatW
GetSystemDirectoryW
lstrcmpiW
GetModuleFileNameW
WriteFile
IsBadWritePtr
LockResource
SizeofResource
MapViewOfFile
FindResourceA
lstrlenW
lstrcpyW
CreateFileW
HeapFree
lstrcpynA
HeapAlloc
GetProcessHeap
lstrcmpiA
DuplicateHandle
TerminateJobObject
AssignProcessToJobObject
CreateJobObjectA
LoadLibraryExA
Sleep
SetFileAttributesA
SetEndOfFile
SetFilePointer
CopyFileA
FlushFileBuffers
RemoveDirectoryA
GetDriveTypeA
GetLogicalDriveStringsA
InterlockedExchange
LocalFree
FreeLibrary
GetTempPathA
GetTickCount
GlobalFree
OpenProcess
GetStartupInfoA
CreateProcessA
CloseHandle
GetCurrentProcess
GetCurrentThreadId
CreateEventA
GetLastError
CreateThread
GetModuleFileNameA
lstrlenA
GetSystemDirectoryA
LoadLibraryW
GetProcAddress
CreateToolhelp32Snapshot
Process32First
Process32Next
LoadResource
ExitProcess
VirtualQuery
wsprintfW
wsprintfA
GetInputState
PostThreadMessageA
PeekMessageA
CloseServiceHandle
DeleteService
CreateServiceA
RegQueryValueExA
OpenSCManagerA
OpenServiceA
StartServiceA
RegOpenKeyExA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
GetSecurityInfo
SetEntriesInAclA
SetSecurityInfo
CreateProcessAsUserA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
LookupAccountSidA
GetTokenInformation
SetServiceStatus
RegisterServiceCtrlHandlerW
ControlService
send
connect
htons
socket
inet_ntoa
recv
gethostname
WSAStartup
closesocket
gethostbyname
RtlInitUnicodeString
RtlUnwind
NtQuerySystemInformation
RtlEqualUnicodeString
NtQueryObject
SchedServiceMain
ServiceMain
SvchostEntry_W32Time
abc
explore
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ