CodeMain
CodeService
LoaderMain
MainCode
MainService
ServiceCode
Static task
static1
Behavioral task
behavioral1
Sample
3c0e98242f5fc94c7f24177ceb94c055_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3c0e98242f5fc94c7f24177ceb94c055_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
3c0e98242f5fc94c7f24177ceb94c055_JaffaCakes118
Size
168KB
MD5
3c0e98242f5fc94c7f24177ceb94c055
SHA1
261861ae311476fb931b5e0a1b73fc0a8594468a
SHA256
8738e0abbc74a27d6c4f4d548a3a3a4c90214d18a7fdfb0b2fad18e70f7bb7d0
SHA512
6bd763736a77a7f5ae425ec6c401bd06eab36289dad029e06295d72bc406dae30f6519bb35ecc332b9ab438503f65e1cb1d6a3d35aca5cf5ddc51165d453ecfd
SSDEEP
3072:+ovSGQ5qKRc+3bJo/+EDO5NkPFkIAr8vYTk2bZIjV2TiTrd5:+zu7Qo/bO5NkNIr6Q2j8TiP
Checks for missing Authenticode signature.
resource |
---|
3c0e98242f5fc94c7f24177ceb94c055_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GlobalFree
GlobalLock
GlobalAlloc
GlobalUnlock
GlobalSize
GetTickCount
GetStartupInfoA
CreatePipe
DisconnectNamedPipe
PeekNamedPipe
WaitForMultipleObjects
DeviceIoControl
GlobalMemoryStatus
GetProcessHeap
lstrcmpiA
Process32Next
Process32First
ReleaseMutex
OpenEventA
SetErrorMode
CreateMutexA
SetUnhandledExceptionFilter
FreeConsole
LocalSize
GetCurrentThreadId
HeapAlloc
OutputDebugStringA
GetWindowsDirectoryA
WinExec
InterlockedExchange
CreateToolhelp32Snapshot
GetLocalTime
GetSystemDirectoryA
VirtualAllocEx
WriteProcessMemory
CreateRemoteThread
GetCurrentProcess
SetLastError
GetModuleFileNameA
SetFilePointer
Sleep
MoveFileA
WriteFile
ReadFile
CreateFileA
GetFileSize
RemoveDirectoryA
LocalAlloc
LocalReAlloc
FindNextFileA
LocalFree
FindClose
GetDiskFreeSpaceExA
CreateProcessA
CreateDirectoryA
GetLastError
DeleteFileA
GetVersionExA
GetPrivateProfileStringA
lstrcmpA
WideCharToMultiByte
lstrlenA
MultiByteToWideChar
FreeLibrary
lstrcatA
ExpandEnvironmentStringsA
OpenProcess
GetFileAttributesA
CancelIo
CreateEventA
lstrcpyA
ResetEvent
EnterCriticalSection
VirtualFree
DeleteCriticalSection
CreateThread
ResumeThread
SetEvent
WaitForSingleObject
LoadLibraryA
GetProcAddress
TerminateThread
CloseHandle
GetSystemInfo
SendMessageA
SystemParametersInfoA
keybd_event
MapVirtualKeyA
mouse_event
SetCapture
WindowFromPoint
SetCursorPos
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
GetClipboardData
BlockInput
DestroyCursor
GetDC
GetDesktopWindow
ReleaseDC
GetCursorPos
GetCursorInfo
SetProcessWindowStation
OpenWindowStationA
GetProcessWindowStation
GetWindowThreadProcessId
IsWindowVisible
CloseDesktop
SetThreadDesktop
IsWindow
CloseWindow
CreateWindowExA
LoadCursorA
EnumWindows
GetKeyState
GetAsyncKeyState
GetForegroundWindow
DispatchMessageA
GetWindowTextA
SetRect
wsprintfA
CharNextA
MessageBoxA
GetSystemMetrics
ExitWindowsEx
TranslateMessage
GetMessageA
PostMessageA
OpenDesktopA
GetThreadDesktop
GetUserObjectInformationA
OpenInputDesktop
DeleteObject
CreateDIBSection
BitBlt
GetDIBits
SelectObject
DeleteDC
CreateCompatibleDC
CreateCompatibleBitmap
RegCloseKey
GetTokenInformation
LookupAccountSidA
SetServiceStatus
RegisterServiceCtrlHandlerA
DuplicateTokenEx
SetTokenInformation
CreateProcessAsUserA
OpenProcessToken
IsValidSid
LookupAccountNameA
LsaOpenPolicy
LsaFreeMemory
RegQueryValueA
RegOpenKeyExA
CloseServiceHandle
DeleteService
ControlService
QueryServiceStatus
OpenServiceA
OpenSCManagerA
SetNamedSecurityInfoA
BuildExplicitAccessWithNameA
GetNamedSecurityInfoA
SetEntriesInAclA
RegQueryValueExA
RegOpenKeyA
RegSetValueExA
RegCreateKeyExA
CloseEventLog
ClearEventLogA
OpenEventLogA
AdjustTokenPrivileges
LookupPrivilegeValueA
FreeSid
RegSetKeySecurity
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
AddAccessAllowedAce
InitializeAcl
GetLengthSid
AllocateAndInitializeSid
RegEnumValueA
RegEnumKeyExA
RegDeleteValueA
RegDeleteKeyA
SHGetFileInfoA
SHGetSpecialFolderPathA
SHDeleteKeyA
_strnicmp
_strupr
realloc
_stricmp
_adjust_fdiv
_initterm
calloc
_beginthreadex
wcstombs
system
_strcmpi
strncat
_snprintf
_errno
strchr
strncmp
atoi
strncpy
strcat
strrchr
malloc
free
strcmp
_except_handler3
strcpy
memcmp
strstr
strlen
_ftol
ceil
memmove
__CxxFrameHandler
memcpy
??3@YAXPAX@Z
??2@YAPAXI@Z
memset
waveInAddBuffer
waveInPrepareHeader
waveOutPrepareHeader
waveInGetNumDevs
waveOutOpen
waveInStart
inet_ntoa
send
inet_addr
getsockname
bind
gethostname
select
closesocket
recv
ntohs
socket
gethostbyname
connect
setsockopt
WSAIoctl
WSACleanup
WSAStartup
ioctlsocket
__WSAFDIsSet
recvfrom
sendto
listen
accept
getpeername
htons
GetProfilesDirectoryA
GetUserProfileDirectoryA
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBDABV?$allocator@D@1@@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
?c_str@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEPBDXZ
InternetOpenUrlA
InternetReadFile
InternetOpenA
InternetCloseHandle
capGetDriverDescriptionA
capCreateCaptureWindowA
ICSeqCompressFrame
ICSendMessage
ICOpen
ICClose
ICCompressorFree
ICSeqCompressFrameEnd
ICSeqCompressFrameStart
WTSFreeMemory
WTSQueryUserToken
WTSQuerySessionInformationA
EnumProcessModules
GetModuleFileNameExA
GetProcessMemoryInfo
CodeMain
CodeService
LoaderMain
MainCode
MainService
ServiceCode
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ