InstallServices
RundllInstall
ServiceMain
Static task
static1
Behavioral task
behavioral1
Sample
34de78554b317af9fe8ed380f17beda5_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
34de78554b317af9fe8ed380f17beda5_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
34de78554b317af9fe8ed380f17beda5_JaffaCakes118
Size
156KB
MD5
34de78554b317af9fe8ed380f17beda5
SHA1
ced964e93c620c63ce3b6e3b7884e1fe0aa997c3
SHA256
1d0a16e4d36aa25d1bfba6e658e0a186799e344255452a79fdddb25fcc466883
SHA512
fc0e4260cf2323666e5a431678f9c9a86317cbe7f020b71e65de8cf1266b941576cc4f4156a9e3d455d2b476722501f6cf3ed42de8240e31fce7512a3ff1f6a9
SSDEEP
3072:pnocSKEusItsWnocSKEusItsWnocSKEusItsk:pocSKEiocSKEiocSKEY
Checks for missing Authenticode signature.
resource |
---|
34de78554b317af9fe8ed380f17beda5_JaffaCakes118 |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
_adjust_fdiv
_initterm
strrchr
atoi
wcsrchr
wcscpy
wcscmp
free
malloc
wcsncpy
wcslen
wcscat
_strlwr
strstr
GetPrivateProfileStructA
OpenFileMappingA
LocalFree
LocalAlloc
LeaveCriticalSection
GetProcessHeap
HeapFree
EnterCriticalSection
GetTickCount
lstrlenA
lstrcpynA
SetEvent
Sleep
ResetEvent
WaitForSingleObject
GetTempPathA
CreateThread
HeapAlloc
ExitThread
WinExec
CloseHandle
WriteFile
CreateFileA
lstrcatA
GetSystemDirectoryA
CreateEventW
GetLastError
InitializeCriticalSection
TerminateThread
SuspendThread
MapViewOfFile
lstrcpynW
lstrlenW
GetModuleFileNameW
MultiByteToWideChar
GetModuleFileNameA
CreateMutexA
GetFileAttributesW
FindClose
FindNextFileW
FindFirstFileW
GetDriveTypeW
GetLogicalDrives
CopyFileW
GetProcAddress
LoadLibraryA
VirtualAlloc
lstrcpyA
ResumeThread
RegOpenKeyW
RegQueryValueExW
OpenSCManagerW
CreateServiceW
CloseServiceHandle
RegCreateKeyExW
RegSetValueExW
RegCloseKey
DeleteService
RegisterServiceCtrlHandlerW
SetServiceStatus
URLDownloadToFileA
SHGetValueA
wvsprintfA
wsprintfW
wsprintfA
InstallServices
RundllInstall
ServiceMain
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ