RestoreHDDPCI
ServiceMain
Static task
static1
Behavioral task
behavioral1
Sample
4d26be0bcf39e773d01b4a4c15e1a8d1_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
4d26be0bcf39e773d01b4a4c15e1a8d1_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
4d26be0bcf39e773d01b4a4c15e1a8d1_JaffaCakes118
Size
79KB
MD5
4d26be0bcf39e773d01b4a4c15e1a8d1
SHA1
432ff4ff7da40ab2f92751b1f4b7a07b8a8f5057
SHA256
3c3e340b03b4e4b9d1e73ae7232a897ab4c14c785e419a160684c1ad121b7da4
SHA512
1663380c691536d5c0dbfa83f2e4f8d77f05d854ade9b6d1f70f5ef9a488cb497ea313e1d8354224e4c3757b86791d3f7e40c49203e56e18af4ad28f4c74cefb
SSDEEP
1536:VQXZHnomYxymAyGfD4rWycX91ebfvkKecMKyI0wMhos5h2:AZHrN7fD4rWyw91ervkK/L4wMhos5
Checks for missing Authenticode signature.
resource |
---|
4d26be0bcf39e773d01b4a4c15e1a8d1_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetTempPathA
TerminateThread
MoveFileExA
CreateEventA
GetTickCount
GetLocalTime
WaitForSingleObject
InterlockedExchange
GetModuleHandleA
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalSize
GlobalMemoryStatus
SizeofResource
LoadResource
FindResourceA
DeviceIoControl
LoadLibraryExA
SetFileAttributesA
CreateToolhelp32Snapshot
GetFileAttributesA
GetCurrentThreadId
GetCurrentProcess
ReleaseMutex
OpenEventA
SetErrorMode
CreateMutexA
SetUnhandledExceptionFilter
FreeConsole
GetStartupInfoA
CreatePipe
DisconnectNamedPipe
TerminateProcess
PeekNamedPipe
WaitForMultipleObjects
ResetEvent
SetEvent
CancelIo
LocalSize
OpenProcess
Process32Next
Process32First
lstrcmpiA
GetSystemDirectoryA
SetLastError
Sleep
GetLastError
MoveFileA
WriteFile
SetFilePointer
ReadFile
CreateFileA
GetFileSize
CloseHandle
RemoveDirectoryA
LocalAlloc
FindFirstFileA
LocalReAlloc
FindNextFileA
LocalFree
FindClose
GetLogicalDriveStringsA
GetVolumeInformationA
GetDiskFreeSpaceExA
GetDriveTypeA
CreateProcessA
DeleteFileA
GetVersionExA
GetPrivateProfileStringA
lstrcmpA
WideCharToMultiByte
MultiByteToWideChar
LoadLibraryA
GetProcAddress
FreeLibrary
GetWindowsDirectoryA
lstrcpyA
lstrcatA
GetPrivateProfileSectionNamesA
lstrlenA
VirtualAlloc
EnterCriticalSection
LeaveCriticalSection
VirtualFree
DeleteCriticalSection
InitializeCriticalSection
PostMessageA
OpenDesktopA
GetThreadDesktop
GetUserObjectInformationA
OpenInputDesktop
SetThreadDesktop
CloseDesktop
EnumWindows
GetWindowThreadProcessId
ExitWindowsEx
GetProcessWindowStation
OpenWindowStationA
SetProcessWindowStation
CloseWindowStation
GetCursorPos
ReleaseDC
CreateWindowExA
GetDC
GetSystemMetrics
SetRect
GetClipboardData
OpenClipboard
EmptyClipboard
SetClipboardData
CloseClipboard
mouse_event
SetCursorPos
WindowFromPoint
SetCapture
MapVirtualKeyA
keybd_event
SystemParametersInfoA
SendMessageA
UnhookWindowsHookEx
CloseWindow
IsWindow
SetWindowsHookExA
CallNextHookEx
GetFocus
GetDesktopWindow
GetKeyNameTextA
GetActiveWindow
GetWindowTextA
wsprintfA
IsWindowVisible
DeleteDC
GetPaletteEntries
CreateCompatibleDC
CreateDIBSection
CreateHalftonePalette
DeleteObject
BitBlt
SelectObject
SHDeleteKeyA
GetTokenInformation
LookupAccountSidA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegisterServiceCtrlHandlerExA
SetServiceStatus
StartServiceA
OpenEventLogA
IsValidSid
LookupAccountNameA
LsaFreeMemory
RegCloseKey
RegQueryValueA
RegOpenKeyExA
CloseServiceHandle
DeleteService
ControlService
QueryServiceStatus
OpenServiceA
OpenSCManagerA
RegSetValueExA
RegCreateKeyA
RegQueryValueExA
RegOpenKeyA
CloseEventLog
ClearEventLogA
SHGetFileInfoA
SHGetSpecialFolderPathA
strchr
malloc
strcpy
strcmp
??3@YAXPAX@Z
_strcmpi
__CxxFrameHandler
strrchr
_except_handler3
strcat
strncpy
_CxxThrowException
memset
atoi
wcstombs
memcmp
_beginthreadex
calloc
free
??1type_info@@UAE@XZ
_initterm
_adjust_fdiv
??2@YAPAXI@Z
strstr
strlen
_ftol
memcpy
memmove
realloc
ceil
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
MakeSureDirectoryPathExists
capGetDriverDescriptionA
capCreateCaptureWindowA
URLDownloadToFileA
ImmReleaseContext
ImmGetContext
ImmGetCompositionStringA
InternetReadFile
InternetOpenUrlA
InternetOpenA
InternetCloseHandle
EnumProcessModules
GetModuleFileNameExA
send
socket
gethostname
getsockname
WSAStartup
WSACleanup
closesocket
gethostbyname
recv
select
ntohs
setsockopt
connect
htons
WTSQuerySessionInformationA
WTSFreeMemory
RestoreHDDPCI
ServiceMain
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ