ResetSSDT
ServiceMain
Static task
static1
Behavioral task
behavioral1
Sample
427e7082554dee3b6f20798ba6807b1d_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
427e7082554dee3b6f20798ba6807b1d_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
427e7082554dee3b6f20798ba6807b1d_JaffaCakes118
Size
95KB
MD5
427e7082554dee3b6f20798ba6807b1d
SHA1
5d57ef63041917f1c616a8544a5761a5643edf9a
SHA256
2efbcd41c9e4a0ec66925b4b7d21a3a6e7b74dc67ab4f28d6532a20f7000fbda
SHA512
955dc3a8c653c531c0f8cf9197c46f9a62ef98f19d1ab2db3cdb7f893c18e1d0e6320279e62abc21be71a51d98fd0b22220601962c5bb39d2c3371eda3185587
SSDEEP
1536:aXBUs/2v1NlBW2BmiVgBH+GSd9PBcqcPf9syU74vEsy+dCrhO1Le1X:aXBxms25eBH+h9PBcqi9syU74vEsy+d6
Checks for missing Authenticode signature.
resource |
---|
427e7082554dee3b6f20798ba6807b1d_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
SHDeleteKeyA
_crt_debugger_hook
__dllonexit
_lock
_onexit
__clean_type_info_names_internal
_unlock
?_type_info_dtor_internal_method@type_info@@QAEXXZ
?terminate@@YAXXZ
__CppXcptFilter
_adjust_fdiv
_amsg_exit
_initterm_e
_initterm
_decode_pointer
_encoded_null
_malloc_crt
_encode_pointer
_except_handler4_common
free
calloc
_beginthreadex
wcstombs
atoi
realloc
??_U@YAPAXI@Z
strncpy
??0exception@std@@QAE@ABV01@@Z
_invalid_parameter_noinfo
strrchr
??0exception@std@@QAE@XZ
??1exception@std@@UAE@XZ
malloc
strchr
_CxxThrowException
??2@YAPAXI@Z
memset
__CxxFrameHandler3
??3@YAXPAX@Z
memmove
memcpy
ceil
strstr
_stricmp
InitializeCriticalSection
DeleteCriticalSection
VirtualFree
VirtualAlloc
LeaveCriticalSection
EnterCriticalSection
CreateEventA
CloseHandle
WaitForSingleObject
SetEvent
InterlockedExchange
CancelIo
Sleep
lstrcpyA
ResetEvent
lstrlenA
GetPrivateProfileSectionNamesA
lstrcatA
GetWindowsDirectoryA
FreeLibrary
GetProcAddress
LoadLibraryA
MultiByteToWideChar
WideCharToMultiByte
lstrcmpA
GetPrivateProfileStringA
GetVersionExA
CreateProcessA
GetDriveTypeA
GetDiskFreeSpaceExA
GetVolumeInformationA
GetLogicalDriveStringsA
FindClose
LocalFree
FindNextFileA
LocalReAlloc
FindFirstFileA
LocalAlloc
RemoveDirectoryA
DeleteFileA
GetFileSize
CreateFileA
WriteFile
SetFilePointer
MoveFileA
ReadFile
GetLastError
SetLastError
GetSystemDirectoryA
GetFileAttributesA
GetTempPathA
TerminateThread
MoveFileExA
GetLocalTime
GetTickCount
GetModuleHandleA
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalSize
DisconnectNamedPipe
TerminateProcess
PeekNamedPipe
WaitForMultipleObjects
GetStartupInfoA
CreatePipe
SizeofResource
LoadResource
FindResourceA
DeviceIoControl
LoadLibraryExA
SetFileAttributesA
ReleaseMutex
OpenEventA
SetErrorMode
CreateMutexA
SetUnhandledExceptionFilter
FreeConsole
LocalSize
GetCurrentProcess
Process32Next
OpenProcess
Process32First
CreateToolhelp32Snapshot
lstrcmpiA
GetCurrentThreadId
InterlockedCompareExchange
UnhandledExceptionFilter
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
IsDebuggerPresent
OpenInputDesktop
SetThreadDesktop
CloseDesktop
EnumWindows
IsWindowVisible
GetWindowThreadProcessId
ExitWindowsEx
GetProcessWindowStation
OpenWindowStationA
SetProcessWindowStation
CloseWindowStation
GetCursorPos
GetSystemMetrics
SetRect
GetUserObjectInformationA
GetDC
ReleaseDC
GetClipboardData
OpenClipboard
EmptyClipboard
SetClipboardData
CloseClipboard
mouse_event
SetCursorPos
WindowFromPoint
SetCapture
MapVirtualKeyA
keybd_event
GetThreadDesktop
OpenDesktopA
PostMessageA
CloseWindow
IsWindow
CreateWindowExA
GetDesktopWindow
wsprintfA
GetWindowTextA
GetActiveWindow
GetKeyNameTextA
GetFocus
CallNextHookEx
SetWindowsHookExA
UnhookWindowsHookEx
SystemParametersInfoA
SendMessageA
CreateCompatibleDC
CreateDIBSection
SelectObject
BitBlt
DeleteObject
DeleteDC
GetPaletteEntries
CreateHalftonePalette
OpenServiceA
StartServiceA
OpenEventLogA
GetTokenInformation
LookupAccountSidA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegisterServiceCtrlHandlerExA
IsValidSid
LookupAccountNameA
LsaClose
LsaRetrievePrivateData
LsaOpenPolicy
LsaFreeMemory
RegCloseKey
RegQueryValueA
RegOpenKeyExA
CloseServiceHandle
DeleteService
ControlService
QueryServiceStatus
ClearEventLogA
OpenSCManagerA
RegSetValueExA
RegCreateKeyA
RegQueryValueExA
RegOpenKeyA
CloseEventLog
SetServiceStatus
SHGetFileInfoA
SHGetSpecialFolderPathA
closesocket
gethostbyname
WSAStartup
connect
ntohs
socket
gethostname
getsockname
htons
setsockopt
send
select
recv
WSACleanup
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
MakeSureDirectoryPathExists
ImmReleaseContext
ImmGetContext
ImmGetCompositionStringA
InternetOpenA
InternetOpenUrlA
InternetReadFile
InternetCloseHandle
URLDownloadToFileA
capGetDriverDescriptionA
capCreateCaptureWindowA
GetModuleFileNameExA
EnumProcessModules
WTSQuerySessionInformationA
WTSFreeMemory
ResetSSDT
ServiceMain
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ