DelSer
ServiceMain
Setup
Static task
static1
Behavioral task
behavioral1
Sample
3ec68e8ca26e1b42d45f62cee5885269_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3ec68e8ca26e1b42d45f62cee5885269_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
3ec68e8ca26e1b42d45f62cee5885269_JaffaCakes118
Size
108KB
MD5
3ec68e8ca26e1b42d45f62cee5885269
SHA1
ab56b8fc846217b8d3c6ef0436f880e120bd5d49
SHA256
2cb11d8cbb42a1f8d4f39badcd136c6316a19457ed5ea4aa6fb30302acca6a7d
SHA512
a431345e6fb0ffbae00fb01f636adf2072d03b764a68e8b6f0d142c0b7de5f85f2c2ae219b165f25abad07ad807a43bae5aee718f4851a8dfd2834c8b83118c8
SSDEEP
3072:LBT9p00zxfgEsY148Bl2j8o4VdM4jIIvScKmpK:LV9b1fXRkf4/MWT4
Checks for missing Authenticode signature.
resource |
---|
3ec68e8ca26e1b42d45f62cee5885269_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
SysFreeString
SysReAllocStringLen
SysAllocStringLen
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
GetKeyboardType
DestroyWindow
MessageBoxA
CharNextA
CreateWindowExA
mouse_event
keybd_event
WindowFromPoint
UnregisterClassA
TranslateMessage
ShowWindow
SetThreadDesktop
SetProcessWindowStation
SetCursorPos
SetCapture
SendMessageA
ReleaseDC
RegisterClassA
PeekMessageA
OpenWindowStationA
OpenInputDesktop
OpenClipboard
MsgWaitForMultipleObjects
MessageBoxA
IsWindowVisible
IsClipboardFormatAvailable
GetWindowThreadProcessId
GetWindowTextA
GetThreadDesktop
GetSystemMetrics
GetSysColor
GetProcessWindowStation
GetWindow
GetDC
GetClipboardData
GetClassInfoA
FindWindowA
FillRect
EnableWindow
DispatchMessageA
DestroyWindow
DefWindowProcA
CopyImage
CloseWindowStation
CloseDesktop
CloseClipboard
CharUpperBuffA
GetACP
Sleep
VirtualFree
VirtualAlloc
GetCurrentThreadId
VirtualQuery
SetCurrentDirectoryA
MultiByteToWideChar
GetStartupInfoA
GetModuleFileNameA
GetLastError
GetCommandLineA
FreeLibrary
ExitProcess
ExitThread
CreateThread
WriteFile
UnhandledExceptionFilter
SetFilePointer
SetEndOfFile
RtlUnwind
ReadFile
RaiseException
GetStdHandle
GetFileSize
GetFileType
CreateFileA
CloseHandle
TlsSetValue
TlsGetValue
TlsFree
TlsAlloc
LocalFree
LocalAlloc
WriteProcessMemory
WriteFile
WinExec
WaitForSingleObject
VirtualFreeEx
VirtualAllocEx
TerminateThread
TerminateProcess
SystemTimeToFileTime
SuspendThread
Sleep
SizeofResource
SetThreadPriority
SetPriorityClass
SetFilePointer
SetFileAttributesA
SetCurrentDirectoryA
ResumeThread
RemoveDirectoryA
ReadFile
QueryPerformanceCounter
OpenProcess
OpenMutexA
MoveFileA
LockResource
LoadResource
LoadLibraryA
LeaveCriticalSection
InitializeCriticalSection
GlobalUnlock
GlobalReAlloc
GlobalMemoryStatus
GlobalHandle
GlobalLock
GlobalFree
GlobalAlloc
GetWindowsDirectoryA
GetVersionExA
GetTimeFormatA
GetTickCount
GetThreadPriority
GetSystemDirectoryA
GetStdHandle
GetStartupInfoA
GetProcAddress
GetPriorityClass
GetModuleHandleA
GetModuleFileNameA
GetLocalTime
GetLastError
GetFileAttributesA
GetExitCodeThread
GetExitCodeProcess
GetDriveTypeA
GetDateFormatA
GetCurrentThreadId
GetCurrentThread
GetCurrentProcess
GetCurrentDirectoryA
GetComputerNameA
InterlockedIncrement
InterlockedDecrement
FreeLibrary
FreeConsole
FindResourceA
FindNextFileA
FindFirstFileA
FindClose
FileTimeToSystemTime
FileTimeToLocalFileTime
FileTimeToDosDateTime
ExpandEnvironmentStringsA
ExitThread
EnterCriticalSection
DeleteFileA
DeleteCriticalSection
CreateThread
CreateRemoteThread
CreateProcessA
CreatePipe
CreateMutexA
CreateFileA
CreateDirectoryA
CopyFileA
CompareStringA
CloseHandle
VirtualProtect
StretchDIBits
SetDIBits
SelectObject
GetObjectA
GetDIBits
GdiFlush
DeleteObject
DeleteDC
CreateSolidBrush
CreateDIBSection
CreateCompatibleDC
CreateCompatibleBitmap
CreateBrushIndirect
BitBlt
SHGetSpecialFolderPathA
DelSer
ServiceMain
Setup
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ