DllRegisterServer
ServiceMain
checks1
Static task
static1
Behavioral task
behavioral1
Sample
2af9b20bf94a7ee4532a29531ab9cf31_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2af9b20bf94a7ee4532a29531ab9cf31_JaffaCakes118.dll
Resource
win10v2004-20240704-en
Target
2af9b20bf94a7ee4532a29531ab9cf31_JaffaCakes118
Size
95KB
MD5
2af9b20bf94a7ee4532a29531ab9cf31
SHA1
0b68a4014e6e8cd6a5d71e6510b238cce10625ba
SHA256
cbaa367172ca8fcf58cba56e9a883524bf0cc2a582e86fe0948c3b6e4d891396
SHA512
05b76a64617baba0ecb16e4f999c42160336eadb40096dae8d8ee6741968c5b13cde30bf8bd5997b4e973fd79bcd7ab246fb259948b2a682fb0e51211d372186
SSDEEP
1536:2KZW4WkPkQ+4vegd74cEc1JPQbFR1pYmyRYwLcGVTQ6jhT:2KZWV9QT1d74hc1JuOJLcchT
Checks for missing Authenticode signature.
resource |
---|
2af9b20bf94a7ee4532a29531ab9cf31_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
SysFreeString
SysReAllocStringLen
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
RegSetValueExA
RegOpenKeyExA
RegDeleteValueA
RegCreateKeyExA
RegCloseKey
StartServiceA
SetServiceStatus
RegisterServiceCtrlHandlerA
OpenServiceA
OpenSCManagerA
CreateServiceA
CloseServiceHandle
GetKeyboardType
DestroyWindow
MessageBoxA
GetACP
Sleep
VirtualFree
VirtualAlloc
GetTickCount
QueryPerformanceCounter
GetCurrentThreadId
VirtualQuery
GetStartupInfoA
GetCommandLineA
FreeLibrary
ExitProcess
WriteFile
UnhandledExceptionFilter
RtlUnwind
RaiseException
GetStdHandle
TlsSetValue
TlsGetValue
TlsFree
TlsAlloc
LocalFree
LocalAlloc
WritePrivateProfileStringA
WinExec
TerminateProcess
SetFileTime
SetFileAttributesA
GetTickCount
GetSystemDirectoryA
GetPrivateProfileStringA
GetModuleFileNameA
GetLocalTime
GetFileTime
GetFileAttributesA
FreeLibrary
FreeConsole
DeleteFileA
CreateFileA
CreateDirectoryA
CopyFileA
CloseHandle
Sleep
DeleteUrlCacheEntry
ShellExecuteExA
ShellExecuteA
URLDownloadToFileA
DllRegisterServer
ServiceMain
checks1
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ