CoGetComCatalog
GetRPCSSInfo
ServiceMain
WhichService
test
Static task
static1
Behavioral task
behavioral1
Sample
43c1236974174f885521ac5689d375fd_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
43c1236974174f885521ac5689d375fd_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
43c1236974174f885521ac5689d375fd_JaffaCakes118
Size
33KB
MD5
43c1236974174f885521ac5689d375fd
SHA1
7b45b72c90c2ac09c9d0d9d8c05ad9af6264e7b9
SHA256
d3c5665c41bb14c4b85c387a54ad4dcde36d4c30d602202d39b67e701d2218e8
SHA512
65b6ec37e4547d13a92aef33bcd820ea7f305fe4573ec48c512ef2e6c2a9cc1009c01083ad27347933e940f9c740241ca7fd63cced3ca4c59be74958c0d1fa07
SSDEEP
192:ZQ6pIFS/ttVTrb3mlefdaHsmUiu5gltUfIm3wF/3JiDbpIhe3w7A5GUZfIkUNIsx:ZbpbrqlefcrUiuBrIh/YmXIqLR/B4D
Checks for missing Authenticode signature.
resource |
---|
43c1236974174f885521ac5689d375fd_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
WriteFile
CreateFileA
LoadResource
SizeofResource
FindResourceA
lstrlenA
Process32Next
lstrcmpiA
Process32First
CreateToolhelp32Snapshot
GetSystemDirectoryA
OpenProcess
GetCurrentProcessId
VirtualFreeEx
CreateRemoteThread
WriteProcessMemory
VirtualAllocEx
FindClose
FindNextFileA
lstrcpynA
lstrcpyA
WaitForSingleObject
FindFirstFileA
MultiByteToWideChar
SetFileTime
GetFileTime
CreateMutexA
CreateThread
ReleaseMutex
FreeLibrary
CreateEventA
GetLastError
SetEvent
CloseHandle
Sleep
CopyFileA
DeleteFileA
MoveFileExA
LoadLibraryA
GetProcAddress
lstrcmpA
GetModuleFileNameA
wsprintfA
RegOpenKeyA
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
RegSetValueExA
RegOpenKeyExA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegCloseKey
StrStrIA
PathFileExistsA
strcpy
strstr
strncat
strcat
strlen
memset
sprintf
CoGetComCatalog
GetRPCSSInfo
ServiceMain
WhichService
test
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ