?g_dwOperation@@3KA
?g_dwTargetPID@@3KA
FlushBuffer
Init
SM
WLEvtLock
WLEvtLogoff
WLEvtLogon
WLEvtShutdown
WLEvtStartScreenSaver
WLEvtStartup
WLEvtStopScreenSaver
WLEvtUnlock
Static task
static1
Behavioral task
behavioral1
Sample
610e8b2b3b94890a5c54333533e7ccc9_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
610e8b2b3b94890a5c54333533e7ccc9_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
610e8b2b3b94890a5c54333533e7ccc9_JaffaCakes118
Size
64KB
MD5
610e8b2b3b94890a5c54333533e7ccc9
SHA1
effba57003c9a6d959894765873152f6ed691d6d
SHA256
b88dd4a57dc32f9ce9c9e3de88af9f1a4e6fd6cf5ae923286e2279ca82a86838
SHA512
661fa70e8ea532a7cd4f6d751097e8f4b671859dfec055bf5201f377271460dc34de1ff1863a640b8fb6245a52d349a2bb990c9b8321b4cd49622ca36e41c3b5
SSDEEP
1536:pbkwG/gMXTFkWwC/44yVS2YYSJ78DojqB2Fb9CkxkY:uJJXTF/R/44yc2YYSJYkjqB2R9CHY
Checks for missing Authenticode signature.
resource |
---|
610e8b2b3b94890a5c54333533e7ccc9_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
gethostname
WSASocketA
WSAIoctl
inet_ntoa
WSAStartup
WSACleanup
recv
send
htons
gethostbyname
inet_addr
socket
connect
closesocket
WSAGetLastError
RegQueryValueExA
RegCloseKey
RegQueryValueA
InitializeAcl
AddAccessAllowedAce
IsValidSid
GetLengthSid
AllocateAndInitializeSid
FreeSid
CreateProcessAsUserA
GetUserNameA
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
RegOpenKeyExA
GetVersionExA
GetVolumeInformationA
GetDiskFreeSpaceExA
GetDriveTypeA
GetLogicalDriveStringsA
GlobalMemoryStatus
GetSystemInfo
FileTimeToSystemTime
GetFileInformationByHandle
SystemTimeToFileTime
GetLocalTime
LocalAlloc
InterlockedExchange
ReadFile
RaiseException
WideCharToMultiByte
GetModuleFileNameA
CloseHandle
SetEndOfFile
SetFilePointer
WriteFile
GetFileSize
Sleep
GetLastError
CreateFileA
GetComputerNameA
GetSystemDirectoryA
MapViewOfFile
CreateFileMappingA
UnmapViewOfFile
OpenFileMappingA
FlushViewOfFile
ResetEvent
SetEvent
GlobalUnlock
GlobalLock
CreateThread
GetTickCount
GetTempPathA
GetFileAttributesA
WaitForSingleObject
ExitProcess
GetCurrentProcessId
OpenEventA
CreateEventA
HeapFree
GetProcessHeap
HeapAlloc
CreateToolhelp32Snapshot
Process32Next
VirtualFreeEx
CreateRemoteThread
GetProcAddress
WriteProcessMemory
VirtualAllocEx
GetModuleHandleA
Process32First
OpenProcess
ResumeThread
CreateProcessA
ExpandEnvironmentStringsA
LoadLibraryA
FreeLibrary
GetDesktopWindow
GetSystemMetrics
SetWindowsHookExA
GetClassNameA
FindWindowA
EnumChildWindows
CallWindowProcA
SetWindowLongA
UnhookWindowsHookEx
CreateWindowExA
SetClipboardViewer
GetMessageA
TranslateMessage
DispatchMessageA
PostMessageA
DestroyWindow
LoadIconA
LoadCursorA
RegisterClassA
DefWindowProcA
SendMessageA
OpenClipboard
GetClipboardData
CloseClipboard
GetKeyState
GetKeyNameTextA
GetKeyboardState
ToAscii
CallNextHookEx
GetForegroundWindow
GetParent
GetWindowTextA
MapVirtualKeyA
GetWindowLongA
IsWindow
_CxxThrowException
??1exception@@UAE@XZ
??0exception@@QAE@XZ
_mbsrev
_mbscmp
_mbsnbcmp
strcat
difftime
time
sprintf
localtime
strstr
rand
srand
_mbsicmp
_mbsstr
isalpha
atoi
free
realloc
malloc
ftell
fseek
strftime
wcstombs
??1type_info@@UAE@XZ
_initterm
_adjust_fdiv
__CppXcptFilter
_except_handler3
?terminate@@YAXXZ
__dllonexit
_onexit
??0exception@@QAE@ABV0@@Z
fopen
fclose
fread
fwrite
__CxxFrameHandler
strcpy
_mbsrchr
strlen
memcpy
??2@YAPAXI@Z
??3@YAXPAX@Z
memset
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@PBD@Z
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@ABV01@@Z
?at@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAADI@Z
?substr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBE?AV12@II@Z
?find@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIDI@Z
??Y?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@PBD@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??Y?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@ABV01@@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?g_dwOperation@@3KA
?g_dwTargetPID@@3KA
FlushBuffer
Init
SM
WLEvtLock
WLEvtLogoff
WLEvtLogon
WLEvtShutdown
WLEvtStartScreenSaver
WLEvtStartup
WLEvtStopScreenSaver
WLEvtUnlock
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ