InstallService
RundllInstall
RundllUninstall
ServiceMain
UninstallService
Static task
static1
Behavioral task
behavioral1
Sample
4bf2b185205ccf39fb08c1b86d4c4fbc_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
4bf2b185205ccf39fb08c1b86d4c4fbc_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
4bf2b185205ccf39fb08c1b86d4c4fbc_JaffaCakes118
Size
312KB
MD5
4bf2b185205ccf39fb08c1b86d4c4fbc
SHA1
7fda216adf335f99834b8551e2921d3b642ee0e8
SHA256
405286a499a95262818ff3256f603a8e97f8f524d17469352f6e4ba92fc8243c
SHA512
affeb8eca58fb54f0ecf1cd4dbc052d4e459eced48937e0f795c1ac177ae7b1e8bccbab4da5b511937fc3292753051a7563b3c5367382e0cec477207f3d21264
SSDEEP
6144:4IWZ9xnucRqviRPCVdXg24mjTEr+Pmzlj7DTib5jQwWRjP2TBRAVG:1WBucRq0at4b+C05jQwOjP2Tk8
Checks for missing Authenticode signature.
resource |
---|
4bf2b185205ccf39fb08c1b86d4c4fbc_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
gethostbyname
WSAStartup
inet_ntoa
ControlService
InitializeSecurityDescriptor
AllocateAndInitializeSid
GetLengthSid
OpenProcessToken
CreateProcessAsUserA
RegCloseKey
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
SetServiceStatus
CloseServiceHandle
DeleteService
OpenServiceA
OpenSCManagerA
StartServiceA
QueryServiceStatus
RegOpenKeyA
RegCreateKeyA
CreateServiceA
RegisterServiceCtrlHandlerA
RegCreateKeyExA
RegDeleteValueA
RegDeleteKeyA
RegEnumKeyA
AdjustTokenPrivileges
LookupPrivilegeValueA
SetSecurityDescriptorDacl
AddAccessAllowedAce
InitializeAcl
DestroyMenu
PostQuitMessage
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
CharUpperA
CharLowerBuffW
RegisterWindowMessageA
LoadIconA
WinHelpA
GetCapture
GetClassLongA
SetPropA
GetPropA
RemovePropA
IsWindow
GetForegroundWindow
GetDlgItem
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetForegroundWindow
GetClientRect
GetMenu
PostMessageA
CreateWindowExA
GetClassInfoExA
GetSubMenu
GetMenuItemCount
GetMenuItemID
GetMenuState
MessageBoxA
EnableWindow
IsWindowEnabled
GetLastActivePopup
GetWindowLongA
GetParent
SendMessageA
GetWindowThreadProcessId
UnhookWindowsHookEx
GetSysColorBrush
GetSysColor
ReleaseDC
GetDC
GetSystemMetrics
LoadCursorA
ValidateRect
PeekMessageA
GetKeyState
DispatchMessageA
CallNextHookEx
SetWindowsHookExA
UnregisterClassA
SetWindowTextA
GetWindowTextA
PtInRect
GetClassNameA
GetWindowRect
GetDlgCtrlID
GetWindow
ClientToScreen
GetFocus
CheckMenuItem
EnableMenuItem
ModifyMenuA
LoadBitmapA
GetMenuCheckMarkDimensions
SetMenuItemBitmaps
GetWindowPlacement
IsIconic
SystemParametersInfoA
SetWindowPos
SetWindowLongA
CallWindowProcA
DefWindowProcA
CopyRect
AdjustWindowRectEx
RegisterClassA
GetClassInfoA
EnumProcesses
EnumProcessModules
GetModuleBaseNameW
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
FreeLibrary
LocalAlloc
TlsGetValue
GlobalReAlloc
GlobalHandle
TlsAlloc
TlsSetValue
LocalReAlloc
TlsFree
GetProcAddress
GetModuleHandleA
InterlockedDecrement
InterlockedIncrement
FindClose
FindFirstFileA
GetFileAttributesA
GetFileSize
ReadFile
WriteFile
SetFilePointer
FlushFileBuffers
LockFile
UnlockFile
SetEndOfFile
LoadLibraryA
DuplicateHandle
GetVolumeInformationA
GetFullPathNameA
lstrcmpA
GlobalFlags
GlobalGetAtomNameA
lstrcmpW
GlobalDeleteAtom
GlobalFindAtomA
GlobalAddAtomA
GetLocaleInfoA
GetCPInfo
GetOEMCP
GetSystemTimeAsFileTime
RtlUnwind
ExitProcess
RaiseException
HeapReAlloc
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
VirtualAlloc
GetCommandLineA
SetStdHandle
GetFileType
HeapSize
VirtualFree
HeapDestroy
HeapCreate
GetStdHandle
GetACP
LCMapStringA
LCMapStringW
GetConsoleCP
GetConsoleMode
SetHandleCount
GetStartupInfoA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTimeZoneInformation
GetStringTypeA
GetStringTypeW
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
IsValidCodePage
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetLocaleInfoW
GetExitCodeProcess
SetEnvironmentVariableA
FileTimeToLocalFileTime
FileTimeToSystemTime
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
FormatMessageA
LocalFree
FindResourceA
LoadResource
LockResource
SizeofResource
GetCurrentThreadId
GetCurrentProcessId
HeapFree
GetProcessHeap
HeapAlloc
WriteProcessMemory
VirtualQueryEx
ReadProcessMemory
GetCurrentProcess
ReleaseMutex
OpenMutexA
CreateMutexA
CreateThread
TerminateThread
lstrlenA
CompareStringW
CompareStringA
TerminateProcess
SetLastError
GetModuleFileNameA
GetPrivateProfileStringA
GetTickCount
WaitForSingleObject
Sleep
GetSystemDirectoryA
CreateDirectoryA
GetPrivateProfileIntA
WritePrivateProfileStringA
CreateProcessA
DeleteFileA
OpenProcess
CreateToolhelp32Snapshot
Process32First
Process32Next
GetVersionExA
CreateFileA
GetFileTime
CloseHandle
GetVersion
GetLastError
WideCharToMultiByte
MultiByteToWideChar
InterlockedExchange
InterlockedCompareExchange
GetThreadLocale
GetStockObject
DeleteDC
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
SetMapMode
RestoreDC
SaveDC
SetBkColor
SetTextColor
GetClipBox
CreateBitmap
DeleteObject
GetDeviceCaps
GetFileTitleA
OpenPrinterA
DocumentPropertiesA
ClosePrinter
SHGetSpecialFolderPathA
SHGetFolderPathA
UrlUnescapeA
PathIsUNCA
PathFindFileNameA
PathStripToRootA
VariantInit
VariantChangeType
VariantClear
InternetQueryDataAvailable
InternetCrackUrlA
InternetOpenUrlA
InternetReadFile
InternetWriteFile
InternetSetFilePointer
InternetSetStatusCallback
InternetOpenA
InternetGetLastResponseInfoA
InternetCloseHandle
InternetCanonicalizeUrlA
InternetQueryOptionA
InstallService
RundllInstall
RundllUninstall
ServiceMain
UninstallService
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ