ServiceRouteExA
StartServiceEx
StopServiceEx
Static task
static1
Behavioral task
behavioral1
Sample
2b4be70a6fae7666d11779bc2ed53961_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2b4be70a6fae7666d11779bc2ed53961_JaffaCakes118.dll
Resource
win10v2004-20240704-en
Target
2b4be70a6fae7666d11779bc2ed53961_JaffaCakes118
Size
13KB
MD5
2b4be70a6fae7666d11779bc2ed53961
SHA1
9f62af739feba47aca6816522687804962506c3d
SHA256
1905dbc0368ee1d9441d05a28d69f271630cec5ae35b62b1cfeb18df62b58e27
SHA512
7e3f6a9f3edb706061482efda95a0b61ca076f5bc27c98a85cc1239533edd9802c8e197757ee3b4cd7ba849dd0a5e2c69821bba682bf36e729cc91cb560f417d
SSDEEP
192:oUy8dlCWe6E4WZHXhVt0MN4w2ihpuBBQ6PRQkdxytw:oF8XPEZt1q1iruBBQARQk7y
Checks for missing Authenticode signature.
resource |
---|
2b4be70a6fae7666d11779bc2ed53961_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
strlen
memcpy
memcmp
RtlZeroMemory
gethostname
ReadFile
GetPrivateProfileStringA
GetCurrentDirectoryA
EnterCriticalSection
DeleteCriticalSection
lstrcpyA
lstrcmpiA
WaitForSingleObject
TerminateThread
LeaveCriticalSection
CloseHandle
CreateFileA
GetExitCodeThread
GetFileSize
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GlobalAlloc
GlobalFree
LoadLibraryA
CreateThread
VirtualProtectEx
lstrcatA
lstrlenA
InitializeCriticalSection
CallNextHookEx
SetWindowsHookExA
UnhookWindowsHookEx
wsprintfA
ServiceRouteExA
StartServiceEx
StopServiceEx
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ