GetModuleId
ke_GetFirstObj
ke_GetModuleVersion
ke_GetNextObj
ke_IsModuleExists
ke_ModuleAvailable
ke_NotifyEvent
ke_Rand
ke_RegisterAndLoadNewModule
ke_RestartProcess
ke_TerminateKernel
ke_UnloadModuleRequest
ke_free
ke_malloc
Static task
static1
Behavioral task
behavioral1
Sample
38cfb2baa9142a405c87e70416b579ac_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
38cfb2baa9142a405c87e70416b579ac_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
38cfb2baa9142a405c87e70416b579ac_JaffaCakes118
Size
272KB
MD5
38cfb2baa9142a405c87e70416b579ac
SHA1
290a190b721931ad3cb274063f83036cac365722
SHA256
799b4a2e8dc6f4d7862c7bbc2c70f97dde388119fef27cd4260a26b38ddd5d8d
SHA512
8e236c2fff1e37522be5381ea490081b1b3d0a4d18f763703d10a7113433524d9b6699dc2aff58703215a9f45ecbfe0642cb5010d9af2278788fa6b983867de7
SSDEEP
6144:3xnaN+2hIVoLX8rBcT736gxk8XcM9BOp8oCWJu96:3xnaLIVoLX8tcTOgNsyGF9J+6
Checks for missing Authenticode signature.
resource |
---|
38cfb2baa9142a405c87e70416b579ac_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
ord924
ord860
ord2915
ord5572
ord535
ord858
ord4202
ord922
ord543
ord803
ord6394
ord5450
ord6383
ord5440
ord940
ord3584
ord536
ord939
ord540
ord6375
ord4486
ord2554
ord2512
ord5731
ord3922
ord1089
ord5199
ord2396
ord3346
ord5300
ord5302
ord2725
ord4079
ord4698
ord5307
ord5289
ord5714
ord3953
ord2982
ord3147
ord3259
ord4465
ord3136
ord3262
ord2985
ord3081
ord2976
ord3830
ord3831
ord3825
ord3079
ord4080
ord4622
ord4424
ord3738
ord4274
ord561
ord815
ord825
ord823
ord1247
ord798
ord1997
ord2808
ord6407
ord5194
ord533
ord537
ord800
ord1979
ord665
ord5186
ord3663
ord354
_adjust_fdiv
_initterm
??1type_info@@UAE@XZ
_onexit
__dllonexit
_CxxThrowException
memmove
rand
calloc
asctime
localtime
sprintf
free
malloc
realloc
srand
time
__CxxFrameHandler
GetCurrentThreadId
GetLastError
CloseHandle
GetSystemInfo
lstrcpynA
IsBadReadPtr
IsBadCodePtr
GetVersionExA
GetLocaleInfoA
GetModuleHandleA
GetCurrentProcess
ReadProcessMemory
GetModuleFileNameA
CreateThread
CreateFileA
SetUnhandledExceptionFilter
GlobalMemoryStatus
LoadLibraryA
GetSystemDirectoryA
Sleep
VirtualQuery
LoadResource
SizeofResource
FindResourceA
lstrlenA
ReadFile
GetFileSize
LoadLibraryExA
SetLastError
InitializeCriticalSection
DeleteCriticalSection
LeaveCriticalSection
CreateToolhelp32Snapshot
Module32First
Module32Next
lstrcmpA
GetProcAddress
VirtualProtect
VirtualFree
VirtualAlloc
FreeLibrary
GetTickCount
EnterCriticalSection
DispatchMessageA
KillTimer
SetTimer
wsprintfA
TranslateMessage
GetMessageA
RegSetValueExA
RegCreateKeyExA
RegQueryValueExA
RegOpenKeyExA
RegEnumValueA
RegEnumKeyA
RegDeleteValueA
RegDeleteKeyA
RegCloseKey
PathFileExistsA
GetModuleId
ke_GetFirstObj
ke_GetModuleVersion
ke_GetNextObj
ke_IsModuleExists
ke_ModuleAvailable
ke_NotifyEvent
ke_Rand
ke_RegisterAndLoadNewModule
ke_RestartProcess
ke_TerminateKernel
ke_UnloadModuleRequest
ke_free
ke_malloc
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ