ServiceMain
StartRouter
Static task
static1
Behavioral task
behavioral1
Sample
5acbcc9f107c5969636d0785a92f2201_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
5acbcc9f107c5969636d0785a92f2201_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
5acbcc9f107c5969636d0785a92f2201_JaffaCakes118
Size
132KB
MD5
5acbcc9f107c5969636d0785a92f2201
SHA1
71a0f06df4880ffcc545bab4cff01cf76b6b687e
SHA256
c72c42cb97c57d22ae2b5b6fbdc2a212445015ba16466ebd64473ef0d64c7bc9
SHA512
48323afbbfaf9fab61dad7af5d3da32814057853e2b6484e0b954851340a0f7af2535c5053fdfe80cb8f6292ef99a3db58de87ba51befaf95e69ebe92e1006ec
SSDEEP
3072:1fLbGrkMvcw3i4ukQyhZ8765CAHG/Yaqc/1:xLbGws3zLQyhykCAHOYy
Checks for missing Authenticode signature.
resource |
---|
5acbcc9f107c5969636d0785a92f2201_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
WaitForSingleObject
SetEvent
ResumeThread
CreateThread
CreateEventA
CloseHandle
TerminateThread
GetProcAddress
LoadLibraryA
EnterCriticalSection
VirtualFree
VirtualAlloc
ResetEvent
GetPrivateProfileSectionNamesA
FreeLibrary
lstrcmpA
GetPrivateProfileStringA
GetVersionExA
MoveFileA
CreateProcessA
lstrcpyA
GetDriveTypeA
GetDiskFreeSpaceExA
GetVolumeInformationA
GetLogicalDriveStringsA
LocalFree
FindFirstFileA
RemoveDirectoryA
GetFileSize
CreateFileA
WriteFile
SetLastError
GetModuleFileNameA
ExitThread
SleepEx
lstrlenA
WritePrivateProfileStringA
DeleteFileA
GetCurrentProcess
LeaveCriticalSection
Sleep
DeleteCriticalSection
InitializeCriticalSection
GetLocalTime
MapViewOfFile
CreateFileMappingA
GetProcessHeap
UnmapViewOfFile
GlobalFree
GlobalLock
GlobalAlloc
GlobalUnlock
GlobalSize
GetTickCount
GetStartupInfoA
DisconnectNamedPipe
PeekNamedPipe
WaitForMultipleObjects
GetSystemInfo
ReleaseMutex
OpenEventA
SetErrorMode
CreateMutexA
FreeConsole
LocalAlloc
GetLastError
GetCurrentThreadId
RaiseException
InterlockedExchange
strstr
memcmp
strchr
strcat
strcpy
malloc
strcmp
free
_except_handler3
strrchr
strncpy
_CxxThrowException
strlen
strncmp
_errno
exit
realloc
wcstombs
_beginthreadex
calloc
??1type_info@@UAE@XZ
_initterm
_adjust_fdiv
_ftol
ceil
memmove
__CxxFrameHandler
??3@YAXPAX@Z
atoi
??2@YAPAXI@Z
_strupr
_strnicmp
memset
memcpy
_strrev
_strcmpi
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
ICSeqCompressFrame
ServiceMain
StartRouter
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ