LoadProfile
ServiceMain
TestFunc
Static task
static1
Behavioral task
behavioral1
Sample
5f0f0f3bd6cd3cd07a8745a3f63f6b46_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
5f0f0f3bd6cd3cd07a8745a3f63f6b46_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
5f0f0f3bd6cd3cd07a8745a3f63f6b46_JaffaCakes118
Size
37KB
MD5
5f0f0f3bd6cd3cd07a8745a3f63f6b46
SHA1
59a7a72efe562c3905f3d378f70eb211b376d5b4
SHA256
b4b1487618f210bf9d6c3537316107a9dfbae795d8a45469fa79672473b4c87c
SHA512
8a408bf0a9cc6daf9642d7dfb149849ea350b03e115f2b7ea783872e14c9ef7f2b5686a0e1836742da7fa71bab82a5b68ba57bba03a05b0bf5b87e404b2b3ab0
SSDEEP
768:+ooHCFEmc8+CbNP0e+zBQkmmNYqgSdsQVzZnI5ZuQpwS0B7fzqZYK+7Bl6f77:HoH6P6BH7NYTSGQFZI5tp7QR7Bl6j7
Checks for missing Authenticode signature.
resource |
---|
5f0f0f3bd6cd3cd07a8745a3f63f6b46_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
SetProcessWindowStation
OpenWindowStationA
wsprintfA
OpenDesktopA
DestroyWindow
DispatchMessageA
GetMessageA
SendMessageA
IsWindow
ExitWindowsEx
OpenInputDesktop
ToAscii
GetKeyboardState
CallNextHookEx
SendInput
SetThreadDesktop
PostMessageA
SetCursorPos
CharUpperA
GetActiveWindow
GetWindowTextA
SetWindowsHookExA
GetCurrentObject
GetDeviceCaps
DeleteDC
CreateDCA
LookupPrivilegeValueA
OpenProcessToken
RegCreateKeyExA
RegSetValueExA
SetServiceStatus
RegisterServiceCtrlHandlerA
ImpersonateSelf
OpenThreadToken
CreateServiceA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
QueryServiceConfigA
EnumServicesStatusA
DeleteService
ControlService
StartServiceA
OpenSCManagerA
OpenServiceA
CloseServiceHandle
ChangeServiceConfigA
AdjustTokenPrivileges
ShellExecuteA
SHFileOperationA
SHEmptyRecycleBinA
CreateStreamOnHGlobal
connect
socket
WSAStartup
send
inet_addr
setsockopt
gethostbyname
inet_ntoa
closesocket
htons
recv
StrRChrA
StrToIntA
StrCmpNIA
StrChrA
GetModuleFileNameExA
HttpQueryInfoA
InternetReadFile
InternetCloseHandle
InternetOpenA
InternetOpenUrlA
TransmitFile
_adjust_fdiv
_initterm
?terminate@@YAXXZ
_except_handler3
strchr
malloc
wcscmp
free
memcpy
abs
__CxxFrameHandler
memset
??2@YAPAXI@Z
??3@YAXPAX@Z
capCreateCaptureWindowA
capGetDriverDescriptionA
GetVersionExA
GetVersion
QueryPerformanceCounter
QueryPerformanceFrequency
SetThreadPriority
SetPriorityClass
GetThreadPriority
GetCurrentThread
GetPriorityClass
SetFilePointer
GetModuleFileNameA
SetProcessShutdownParameters
GetSystemDirectoryA
GetLocalTime
GetFileAttributesA
GetProcAddress
FreeLibrary
LocalAlloc
InterlockedExchange
RaiseException
LoadLibraryA
GlobalMemoryStatus
GetComputerNameA
lstrcatA
GetCurrentProcessId
DeviceIoControl
CreateProcessA
GetStdHandle
CreatePipe
SetStdHandle
DuplicateHandle
GlobalLock
GlobalUnlock
GetSystemInfo
GlobalFree
GetTickCount
OpenProcess
TerminateProcess
CreateToolhelp32Snapshot
Process32First
GetCurrentProcess
Process32Next
lstrcmpiA
FindFirstFileA
lstrcmpA
FindNextFileA
GetLastError
FindClose
GetFileAttributesExA
GetLogicalDriveStringsA
GetDiskFreeSpaceExA
GetVolumeInformationA
GetDriveTypeA
lstrcpyA
CreateDirectoryA
WriteFile
GetTempPathA
GetCurrentThreadId
lstrlenA
SetEvent
WaitForSingleObject
GetFileSize
DeleteFileA
CreateEventA
CreateThread
Sleep
CreateFileA
GetFileSizeEx
SetFilePointerEx
ReadFile
CloseHandle
GlobalAlloc
MoveFileA
LoadProfile
ServiceMain
TestFunc
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ