CoGetComCatalog
GetRPCSSInfo
ServiceMain
WhichService
test
Static task
static1
Behavioral task
behavioral1
Sample
5f69869b084fef5d1471f68af0563989_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
5f69869b084fef5d1471f68af0563989_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
5f69869b084fef5d1471f68af0563989_JaffaCakes118
Size
35KB
MD5
5f69869b084fef5d1471f68af0563989
SHA1
56fd6b8103ba4f71ad7840d65b2915c48b7e7327
SHA256
6115c97d923b02cc4c248e871c74058e3d1d308eb38c027ce18bc049ee66ab55
SHA512
f5f6bd7aad1ce1e0b4a7f78cffc04e11b6fe8ddb3313a130c1dc6dfbf27839213f25bcf1fabcd96beb4c3bbec4104e04c848dfda6b8cc7211d424e8c21b17f60
SSDEEP
384:HGVpbrqlefcrUi0vdfgpW5r69p/jNTCfijcb0LYQPBFEMx:Adqsf0Ui01fgpcOpgijNLYQ7EM
Checks for missing Authenticode signature.
resource |
---|
5f69869b084fef5d1471f68af0563989_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
WriteFile
CreateFileA
LoadResource
SizeofResource
FindResourceA
lstrlenA
Process32Next
lstrcmpiA
Process32First
CreateToolhelp32Snapshot
GetSystemDirectoryA
OpenProcess
GetCurrentProcessId
VirtualFreeEx
CreateRemoteThread
WriteProcessMemory
VirtualAllocEx
FindClose
FindNextFileA
lstrcpynA
lstrcpyA
WaitForSingleObject
FindFirstFileA
MultiByteToWideChar
SetFileTime
GetFileTime
CreateMutexA
CreateThread
ReleaseMutex
FreeLibrary
CreateEventA
GetLastError
SetEvent
CloseHandle
Sleep
CopyFileA
DeleteFileA
MoveFileExA
LoadLibraryA
GetProcAddress
lstrcmpA
GetModuleFileNameA
wsprintfA
RegOpenKeyA
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
RegSetValueExA
RegOpenKeyExA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegCloseKey
StrStrIA
PathFileExistsA
strcpy
strstr
strncat
strcat
strlen
memset
sprintf
CoGetComCatalog
GetRPCSSInfo
ServiceMain
WhichService
test
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ