Maintenance
ServiceMain
Static task
static1
Behavioral task
behavioral1
Sample
342eb207a36bc97ad32b98cca2918d6e_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
342eb207a36bc97ad32b98cca2918d6e_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
342eb207a36bc97ad32b98cca2918d6e_JaffaCakes118
Size
83KB
MD5
342eb207a36bc97ad32b98cca2918d6e
SHA1
a789f95dfadf0bee9882c4c783cf1156dcbf4bac
SHA256
7f7b6386c6281d0841f823e3b6db9f70d812096fc0ed09da95a1b72ca5d8cd04
SHA512
ba59b025e128c153d62a265b31f9d04a73eaffe783cfce764971f4709755df26dd4c7e4f2b6f24899280967b9d6854da973e67ee6d72cc314f5e85776faef275
SSDEEP
1536:9cgWXk1kpWg4bHg/uZFMNHXNlgMBaU+mbxv:9cgWXk1+EgmZ6Vvg+aKbxv
Checks for missing Authenticode signature.
resource |
---|
342eb207a36bc97ad32b98cca2918d6e_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
SysFreeString
SysReAllocStringLen
SysAllocStringLen
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
SetSecurityDescriptorDacl
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
RegDeleteValueA
RegCreateKeyExA
RegCloseKey
LookupPrivilegeValueA
InitializeSecurityDescriptor
AdjustTokenPrivileges
StartServiceA
SetServiceStatus
RegisterServiceCtrlHandlerA
OpenServiceA
OpenSCManagerA
CreateServiceA
CloseServiceHandle
GetKeyboardType
DestroyWindow
LoadStringA
MessageBoxA
CharNextA
wvsprintfA
ShowWindow
SendMessageA
MessageBoxA
LoadStringA
GetWindowThreadProcessId
GetSystemMetrics
GetDlgItem
FindWindowExA
FindWindowA
CharNextA
CharLowerBuffA
CharUpperBuffA
CharToOemA
GetACP
Sleep
VirtualFree
VirtualAlloc
GetCurrentThreadId
VirtualQuery
WideCharToMultiByte
MultiByteToWideChar
lstrlenA
lstrcpynA
LoadLibraryExA
GetThreadLocale
GetStartupInfoA
GetProcAddress
GetModuleHandleA
GetModuleFileNameA
GetLocaleInfoA
GetLastError
GetCommandLineA
FreeLibrary
FindFirstFileA
FindClose
ExitProcess
WriteFile
UnhandledExceptionFilter
SetFilePointer
SetEndOfFile
RtlUnwind
ReadFile
RaiseException
GetStdHandle
GetFileSize
GetFileType
CreateFileA
CloseHandle
TlsSetValue
TlsGetValue
TlsFree
TlsAlloc
LocalFree
LocalAlloc
lstrlenW
WriteProcessMemory
WritePrivateProfileStringA
WriteFile
WinExec
WideCharToMultiByte
VirtualQueryEx
VirtualQuery
VirtualProtect
VirtualAllocEx
Sleep
SetFileAttributesA
SetErrorMode
ReadFile
OpenProcess
OpenMutexA
LoadLibraryA
GetWindowsDirectoryA
GetVersionExA
GetVersion
GetThreadLocale
GetTempPathA
GetSystemDirectoryA
GetStdHandle
GetProcAddress
GetPrivateProfileStringA
GetPrivateProfileIntA
GetModuleHandleA
GetModuleFileNameA
GetLocaleInfoA
GetLocalTime
GetLastError
GetFileSize
GetFileAttributesA
GetDiskFreeSpaceA
GetDateFormatA
GetCurrentProcess
GetComputerNameA
GetCPInfo
FreeLibrary
FreeConsole
FormatMessageA
EnumCalendarInfoA
DeleteFileA
CreateThread
CreateRemoteThread
CreateMutexA
CreateFileA
CreateDirectoryA
CompareStringA
CloseHandle
Netbios
WSACleanup
WSAStartup
gethostname
gethostbyname
Maintenance
ServiceMain
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ