InstallService
RundllInstall
RundllUninstall
ServiceMain
UninstallService
Static task
static1
Behavioral task
behavioral1
Sample
2e9f1a16ca68b0a322151a564849c6d5_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2e9f1a16ca68b0a322151a564849c6d5_JaffaCakes118.dll
Resource
win10v2004-20240704-en
Target
2e9f1a16ca68b0a322151a564849c6d5_JaffaCakes118
Size
373KB
MD5
2e9f1a16ca68b0a322151a564849c6d5
SHA1
a0c9823632b94f43800757030b0b1784d421232f
SHA256
41aadc6c3b190040cc681237cd5364cd29456ff96ce7bb8098c5d659d73a8ee2
SHA512
1a1b8a15b077bd477a83479360e30e0df7e4978d149b8c56dc41562201cbfb22ed1621c16e34788ad885de31414bc3d8b194ca29b4cdacb75d11eaa30b90c8e7
SSDEEP
6144:DYrgnowIlFS2xYKmHxgGohYJqmxHMVFiW0Bu0Qq3LHE6ABmTBgMU1q:DYknowIlFS2xYKgpImiB0Qq3zABmTSTE
Checks for missing Authenticode signature.
resource |
---|
2e9f1a16ca68b0a322151a564849c6d5_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
gethostbyname
WSACleanup
WSAStartup
inet_addr
ControlService
InitializeSecurityDescriptor
AllocateAndInitializeSid
OpenProcessToken
CreateProcessAsUserA
RegCloseKey
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
RegisterServiceCtrlHandlerA
SetServiceStatus
CloseServiceHandle
DeleteService
OpenServiceA
OpenSCManagerA
StartServiceA
QueryServiceStatus
RegOpenKeyA
RegCreateKeyA
CreateServiceA
RegEnumKeyA
RegCreateKeyExA
RegDeleteValueA
RegDeleteKeyA
AdjustTokenPrivileges
LookupPrivilegeValueA
FreeSid
SetSecurityDescriptorDacl
AddAccessAllowedAce
InitializeAcl
GetLengthSid
PostQuitMessage
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
GetCapture
WinHelpA
LoadIconA
DestroyMenu
CharUpperA
CharLowerBuffW
RegisterWindowMessageA
GetClassLongA
SetPropA
GetPropA
RemovePropA
GetForegroundWindow
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetForegroundWindow
GetClientRect
GetMenu
PostMessageA
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
CopyRect
DefWindowProcA
CallWindowProcA
SystemParametersInfoA
IsIconic
GetSubMenu
GetMenuItemCount
GetMenuItemID
GetMenuState
GetSysColorBrush
GetSysColor
ReleaseDC
GetDC
GetSystemMetrics
LoadCursorA
UnhookWindowsHookEx
MessageBoxA
EnableWindow
IsWindowEnabled
GetLastActivePopup
GetWindowLongA
GetParent
SendMessageA
GetWindowThreadProcessId
SetWindowTextA
GetWindowTextA
PtInRect
GetClassNameA
GetWindowRect
GetDlgCtrlID
GetWindow
ClientToScreen
GetFocus
UnregisterClassA
ValidateRect
PeekMessageA
GetKeyState
DispatchMessageA
CallNextHookEx
SetWindowsHookExA
GetDlgItem
IsWindow
SetWindowLongA
SetWindowPos
CheckMenuItem
EnableMenuItem
ModifyMenuA
LoadBitmapA
GetMenuCheckMarkDimensions
SetMenuItemBitmaps
GetWindowPlacement
EnumProcesses
EnumProcessModules
GetModuleBaseNameW
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
FreeLibrary
LocalAlloc
InterlockedIncrement
InterlockedDecrement
GetProcAddress
GetModuleHandleA
TlsGetValue
GlobalReAlloc
GlobalHandle
TlsAlloc
TlsSetValue
LocalReAlloc
TlsFree
FindClose
FindNextFileA
FindFirstFileA
GetFileAttributesA
GetFileSize
ReadFile
WriteFile
SetFilePointer
FlushFileBuffers
LockFile
UnlockFile
SetEndOfFile
GetThreadLocale
InitializeCriticalSection
GetVolumeInformationA
GetFullPathNameA
lstrcmpA
GlobalFlags
GlobalGetAtomNameA
lstrcmpW
GlobalDeleteAtom
GlobalFindAtomA
GlobalAddAtomA
GetLocaleInfoA
GetCPInfo
GetOEMCP
GetCurrentDirectoryA
RtlUnwind
VirtualAlloc
GetSystemTimeAsFileTime
ExitProcess
RaiseException
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapReAlloc
GetCommandLineA
SetStdHandle
GetFileType
HeapSize
HeapDestroy
HeapCreate
VirtualFree
GetACP
LCMapStringA
LCMapStringW
GetConsoleCP
GetConsoleMode
GetStdHandle
SetHandleCount
GetStartupInfoA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTimeZoneInformation
GetDriveTypeA
GetStringTypeA
GetStringTypeW
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
IsValidCodePage
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetLocaleInfoW
GetExitCodeProcess
SetCurrentDirectoryA
SetEnvironmentVariableA
LoadLibraryA
FileTimeToLocalFileTime
FileTimeToSystemTime
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
FormatMessageA
LocalFree
FindResourceA
LoadResource
LockResource
SizeofResource
GetLocalTime
GetCurrentThreadId
lstrcatA
GetCurrentProcessId
GetProcessHeap
HeapAlloc
HeapFree
WriteProcessMemory
VirtualQueryEx
ReadProcessMemory
GetCurrentProcess
ReleaseMutex
OpenMutexA
CreateMutexA
TerminateProcess
OutputDebugStringA
SetLastError
GetModuleFileNameA
CreateThread
TerminateThread
GetPrivateProfileStringA
GetTickCount
WaitForSingleObject
Sleep
GetSystemDirectoryA
CreateDirectoryA
GetPrivateProfileIntA
WritePrivateProfileStringA
CreateProcessA
DeleteFileA
OpenProcess
CreateToolhelp32Snapshot
Process32First
GetLastError
Process32Next
GetVersionExA
CreateFileA
GetFileTime
SetFileTime
CreateFileW
CloseHandle
lstrlenA
WideCharToMultiByte
CompareStringA
CompareStringW
MultiByteToWideChar
GetVersion
InterlockedExchange
InterlockedCompareExchange
DuplicateHandle
GetStockObject
DeleteDC
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
SetMapMode
RestoreDC
SaveDC
SetBkColor
SetTextColor
GetClipBox
CreateBitmap
DeleteObject
GetDeviceCaps
GetFileTitleA
OpenPrinterA
DocumentPropertiesA
ClosePrinter
SHGetSpecialFolderPathA
SHGetFolderPathA
UrlUnescapeA
PathStripToRootA
PathFindFileNameA
PathIsUNCA
VariantInit
VariantChangeType
VariantClear
InternetCrackUrlA
InternetOpenUrlA
InternetReadFile
InternetWriteFile
InternetSetFilePointer
InternetSetStatusCallback
InternetOpenA
InternetGetLastResponseInfoA
InternetCloseHandle
InternetCanonicalizeUrlA
InternetQueryDataAvailable
InternetQueryOptionA
InstallService
RundllInstall
RundllUninstall
ServiceMain
UninstallService
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ