GetModuleId
ke_GetFirstObj
ke_GetModuleVersion
ke_GetNextObj
ke_IsModuleExists
ke_ModuleAvailable
ke_NotifyEvent
ke_Rand
ke_RegisterAndLoadNewModule
ke_RestartProcess
ke_TerminateKernel
ke_UnloadModuleRequest
ke_free
ke_malloc
Static task
static1
Behavioral task
behavioral1
Sample
2b7750201576fa3dc09862c45160cf6e_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2b7750201576fa3dc09862c45160cf6e_JaffaCakes118.dll
Resource
win10v2004-20240508-en
Target
2b7750201576fa3dc09862c45160cf6e_JaffaCakes118
Size
164KB
MD5
2b7750201576fa3dc09862c45160cf6e
SHA1
fad9baf6c91537534a99129dfd928590c1eb41c9
SHA256
6e93e45fa684c42c1e91bb2080b578c1764413dad0fcc1b621741977a8896901
SHA512
3139cfefd97eabd90cb03832b8c79a9217f58c61ea6803ea8f51b269d7edd5c67e7819f5f94c3c58adf72a307ad615b2df760d17b9f30f4913b0d861474ba1b1
SSDEEP
3072:lBSL6DHOZ1VZl+ZGwZm31gXTVzKyB8I66GSbStqr5k9:lQiOZ15+ZG8mCpzCIwZYr5
Checks for missing Authenticode signature.
resource |
---|
2b7750201576fa3dc09862c45160cf6e_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
ord924
ord860
ord2915
ord5572
ord535
ord858
ord4202
ord922
ord543
ord803
ord6394
ord5450
ord6383
ord5440
ord940
ord3584
ord536
ord939
ord540
ord6375
ord4486
ord2554
ord2512
ord5731
ord3922
ord1089
ord5199
ord2396
ord3346
ord5300
ord5302
ord2725
ord4079
ord4698
ord5307
ord5289
ord5714
ord3953
ord2982
ord3147
ord3259
ord4465
ord3136
ord3262
ord2985
ord3081
ord2976
ord3830
ord3831
ord3825
ord3079
ord4080
ord4622
ord4424
ord3738
ord4274
ord815
ord561
ord825
ord823
ord1247
ord798
ord1997
ord2808
ord6407
ord5194
ord533
ord537
ord800
ord1979
ord665
ord5186
ord3663
ord354
_adjust_fdiv
_initterm
??1type_info@@UAE@XZ
_onexit
__dllonexit
_CxxThrowException
memmove
rand
calloc
asctime
localtime
sprintf
free
malloc
realloc
srand
time
__CxxFrameHandler
_except_handler3
GetCurrentThreadId
GetLastError
CloseHandle
GetSystemInfo
lstrcpynA
IsBadReadPtr
IsBadCodePtr
GetVersionExA
GetLocaleInfoA
GetModuleHandleA
GetCurrentProcess
ReadProcessMemory
GetModuleFileNameA
CreateThread
CreateFileA
SetUnhandledExceptionFilter
GlobalMemoryStatus
LoadLibraryA
GetSystemDirectoryA
Sleep
VirtualQuery
LoadResource
SizeofResource
FindResourceA
lstrlenA
ReadFile
GetFileSize
LoadLibraryExA
SetLastError
InitializeCriticalSection
DeleteCriticalSection
LeaveCriticalSection
CreateToolhelp32Snapshot
Module32First
Module32Next
lstrcmpA
GetProcAddress
VirtualProtect
VirtualFree
VirtualAlloc
FreeLibrary
GetTickCount
EnterCriticalSection
TranslateMessage
SetTimer
wsprintfA
GetMessageA
KillTimer
DispatchMessageA
RegSetValueExA
RegCreateKeyExA
RegQueryValueExA
RegOpenKeyExA
RegEnumValueA
RegEnumKeyA
RegDeleteValueA
RegDeleteKeyA
RegCloseKey
PathFileExistsA
GetModuleId
ke_GetFirstObj
ke_GetModuleVersion
ke_GetNextObj
ke_IsModuleExists
ke_ModuleAvailable
ke_NotifyEvent
ke_Rand
ke_RegisterAndLoadNewModule
ke_RestartProcess
ke_TerminateKernel
ke_UnloadModuleRequest
ke_free
ke_malloc
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ