COMResModuleInstance
DriverProc
KsCreateAllocator
KsCreatePin
KsCreateTopologyNode
ServerMain
modMessage
modmCallback
Static task
static1
Behavioral task
behavioral1
Sample
4b6a79237dc6ad065a31988f52e04331_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
4b6a79237dc6ad065a31988f52e04331_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
4b6a79237dc6ad065a31988f52e04331_JaffaCakes118
Size
32KB
MD5
4b6a79237dc6ad065a31988f52e04331
SHA1
19a0b13b161334568ee90a8dd007f7df226bc6c8
SHA256
afa3b0eba0e9f6248c06dc813c2ff44ce7280c6f5ab395e578ec1368ca63ebfe
SHA512
715524fe9d5d4194547aa9627a6c49e9763bd5705d1d4551573f53ddbc70deee03f33b8bc723a058c9a7d270b63a55c4f449f6364dc891ff5d4fd1f6ede28bdf
SSDEEP
768:MZ2I7fc/zqbCP7yvVeiEZlhCDilRbBWbte:M0Iw/zqA7QVeiEr8OlRbBWbte
Checks for missing Authenticode signature.
resource |
---|
4b6a79237dc6ad065a31988f52e04331_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
CreateThread
WaitForSingleObject
ReadFile
GetFileSize
SetFilePointer
GetLastError
CreateEventA
GetModuleFileNameA
GetTempPathA
GetWindowsDirectoryA
GetSystemDirectoryA
SetFileAttributesA
GetCommandLineA
MultiByteToWideChar
GlobalLock
CreateFileA
WriteFile
GlobalUnlock
GlobalFree
CloseHandle
GlobalAlloc
GetCurrentDirectoryA
DeleteFileA
GetModuleHandleA
Sleep
ExitProcess
IsBadReadPtr
LoadLibraryA
GetProcAddress
VirtualProtect
GetDesktopWindow
GetClientRect
CallWindowProcA
GetClassNameA
SetWindowLongA
RegisterShellHookWindow
RegisterWindowMessageA
GetDC
wsprintfA
ReleaseDC
EnumWindows
GetKeyboardState
MapVirtualKeyA
GetWindowTextA
ToAscii
GetParent
GetWindowThreadProcessId
GetWindowRect
CreateDCA
GetDeviceCaps
DeleteDC
GetObjectA
GetStockObject
DeleteObject
BitBlt
SelectObject
CreateCompatibleBitmap
CreateCompatibleDC
GetDIBits
RealizePalette
SelectPalette
GdipSaveImageToFile
GdipLoadImageFromFile
GdiplusStartup
GdipGetImageEncoders
GdipGetImageEncodersSize
GdipFree
GdipAlloc
GdipCloneImage
GdiplusShutdown
GdipDisposeImage
??0_Lockit@std@@QAE@XZ
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??0Init@ios_base@std@@QAE@XZ
??1Init@ios_base@std@@QAE@XZ
??0_Winit@std@@QAE@XZ
??1_Winit@std@@QAE@XZ
??1_Lockit@std@@QAE@XZ
connect
htons
gethostbyname
socket
recv
inet_ntoa
WSAStartup
send
WSACleanup
inet_addr
closesocket
InternetReadFile
InternetOpenUrlA
InternetOpenA
InternetCloseHandle
strrchr
_access
strcat
strchr
atoi
strncpy
strstr
abs
malloc
free
__dllonexit
_onexit
_initterm
_adjust_fdiv
_getpid
_stricmp
_strlwr
_strrev
wcscmp
??2@YAPAXI@Z
__CxxFrameHandler
strtok
sprintf
strlen
strcmp
memset
strcpy
memcpy
Netbios
COMResModuleInstance
DriverProc
KsCreateAllocator
KsCreatePin
KsCreateTopologyNode
ServerMain
modMessage
modmCallback
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ