CanUnloadNow
CreateMsgHistory
CreatePluginModule
GetClassObject
RegisterServer
ServiceMain
UnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
300d2fec5f0e3d30d7d3341d26516653_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
300d2fec5f0e3d30d7d3341d26516653_JaffaCakes118.exe
Resource
win10v2004-20240704-en
Target
300d2fec5f0e3d30d7d3341d26516653_JaffaCakes118
Size
120KB
MD5
300d2fec5f0e3d30d7d3341d26516653
SHA1
3cd18d0d79e0e0cb13e0488cf7a9c6d549990393
SHA256
3471b8c1a36e914e724278e1389294987a01ff6af77ddd11cd4b99f6db80ebaa
SHA512
5fe3f7add271562d8adb8976c2849d3eb7b31be2cce86a16ced1d85aa4e4649ed24146ef5951ff5455a8453ceffcf0ef9cc5c2af7be3bd0318a24ab0dea0b758
SSDEEP
3072:ikrZIv72IbINQXLi/eao5/RXcXxo/WizWJbZ08bN8:Xrs2IbINQXtr/J4o/WizWRZ0gy
Checks for missing Authenticode signature.
resource |
---|
300d2fec5f0e3d30d7d3341d26516653_JaffaCakes118 |
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
CreateMutexA
SetErrorMode
GetModuleHandleA
OpenEventA
FindResourceA
SizeofResource
LoadResource
CreateFileA
WriteFile
GetModuleFileNameA
GetComputerNameA
GetCurrentThreadId
TerminateProcess
GetStartupInfoA
GlobalSize
GlobalLock
GlobalUnlock
GlobalFree
UnmapViewOfFile
HeapFree
CreateFileMappingA
MapViewOfFile
InitializeCriticalSection
MoveFileA
GetProcAddress
SetFilePointer
ReadFile
GetFileSize
LocalFree
FindClose
GetVolumeInformationA
lstrlenA
lstrcpyA
MultiByteToWideChar
WideCharToMultiByte
GetVersionExA
GetPrivateProfileStringA
GetCurrentProcessId
GetLocalTime
GetLastError
VirtualAlloc
LeaveCriticalSection
VirtualFree
DeleteCriticalSection
CloseHandle
LoadLibraryA
LoadMenuA
RegisterClassA
LoadIconA
CloseDesktop
TranslateMessage
GetMessageA
wsprintfA
CharNextA
GetWindowTextA
MessageBoxA
LoadCursorA
BlockInput
SendMessageA
keybd_event
MapVirtualKeyA
SetCapture
WindowFromPoint
SetCursorPos
mouse_event
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
GetClipboardData
GetSystemMetrics
SetRect
GetDC
GetDesktopWindow
ReleaseDC
GetCursorPos
DestroyCursor
GetCursorInfo
GetWindowThreadProcessId
IsWindowVisible
OpenInputDesktop
GetUserObjectInformationA
GetThreadDesktop
CreateWindowExA
CloseWindow
IsWindow
PostMessageA
DispatchMessageA
GetStockObject
AddAccessAllowedAce
RegDeleteKeyA
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
IsValidSid
LookupAccountNameA
LsaClose
LsaRetrievePrivateData
LsaOpenPolicy
LsaFreeMemory
CloseEventLog
ClearEventLogA
OpenEventLogA
RegSetValueExA
RegCreateKeyExA
CloseServiceHandle
DeleteService
OpenServiceA
OpenSCManagerA
FreeSid
SetSecurityDescriptorDacl
InitializeAcl
GetLengthSid
AllocateAndInitializeSid
InitializeSecurityDescriptor
LookupAccountSidA
GetTokenInformation
OpenProcessToken
RegOpenKeyA
SetServiceStatus
RegisterServiceCtrlHandlerA
AdjustTokenPrivileges
LookupPrivilegeValueA
RegSaveKeyA
RegRestoreKeyA
ShellExecuteA
SHGetSpecialFolderPathA
CoCreateGuid
CoInitialize
CoUninitialize
strncpy
??1exception@@UAE@XZ
??0exception@@QAE@ABV0@@Z
_stricmp
_strcmpi
_strnicmp
_strnset
_strrev
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
_onexit
__dllonexit
??1type_info@@UAE@XZ
calloc
wcstombs
_snprintf
_beginthreadex
_errno
strcat
strncmp
atoi
strrchr
_except_handler3
free
malloc
strcmp
strchr
??0exception@@QAE@ABQBD@Z
sprintf
strcpy
rand
memcmp
strstr
strlen
_ftol
ceil
memset
??2@YAPAXI@Z
putchar
??3@YAXPAX@Z
memcpy
puts
__CxxFrameHandler
_CxxThrowException
memmove
gethostbyname
socket
recv
select
closesocket
send
inet_addr
connect
sendto
WSASocketA
htonl
inet_ntoa
getsockname
bind
recvfrom
__WSAFDIsSet
WSAStartup
WSACleanup
WSAIoctl
htons
setsockopt
WTSQuerySessionInformationA
WTSFreeMemory
CanUnloadNow
CreateMsgHistory
CreatePluginModule
GetClassObject
RegisterServer
ServiceMain
UnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ