CoGetComCatalog
GetName
GetRPCSSInfo
ServiceMain
WhichService
_GetName@16
Static task
static1
Behavioral task
behavioral1
Sample
4854c043b3ecc9bd40b677b313030de4_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
4854c043b3ecc9bd40b677b313030de4_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
4854c043b3ecc9bd40b677b313030de4_JaffaCakes118
Size
75KB
MD5
4854c043b3ecc9bd40b677b313030de4
SHA1
51eefbf0719ab943c25f3d98ef51d9a87e9bf14b
SHA256
b42ca833213efc79e11a77b053f498823a0349bed89d37e360dee716669e0bde
SHA512
11e1184e0d213c26126f0c9843adb190ed889e4f99f3c92580fde122e35c7556133a7447773542a549868287931af6b0865542c54b79919698d0dbe06faa1a92
SSDEEP
768:OH+VAdm1zgDtECeNvt2yuEGOqdN9gAePR8XH:6s6tz+t3uNtT/
Checks for missing Authenticode signature.
resource |
---|
4854c043b3ecc9bd40b677b313030de4_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
SizeofResource
FindResourceA
WriteFile
MultiByteToWideChar
lstrlenA
GetProcAddress
LoadLibraryA
ReleaseMutex
GetLastError
VirtualFreeEx
WaitForSingleObject
WriteProcessMemory
VirtualAllocEx
lstrcmpiA
FindClose
FindNextFileA
lstrcpyA
LoadResource
lstrcatA
GetWindowsDirectoryA
GetSystemDirectoryA
GetCurrentProcess
GetCurrentProcessId
CreateFileA
DeleteFileA
MoveFileExA
CopyFileA
GetModuleFileNameA
CreateMutexA
GetModuleHandleA
CloseHandle
FindFirstFileA
Sleep
wsprintfA
RegSetValueExA
RegOpenKeyA
RegCloseKey
OpenProcessToken
LookupPrivilegeValueA
RegOpenKeyExA
strstr
free
_beginthreadex
??2@YAPAXI@Z
memset
strncat
CoGetComCatalog
GetName
GetRPCSSInfo
ServiceMain
WhichService
_GetName@16
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ