COMResModuleInstance
DriverProc
KsCreateAllocator
KsCreatePin
KsCreateTopologyNode
ServerMain
modMessage
modmCallback
Static task
static1
Behavioral task
behavioral1
Sample
6550d0b3dbe412662d8ca6076835e250_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
6550d0b3dbe412662d8ca6076835e250_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
6550d0b3dbe412662d8ca6076835e250_JaffaCakes118
Size
32KB
MD5
6550d0b3dbe412662d8ca6076835e250
SHA1
1999ee6a8f8cb18c3fe84a2f47fe66eb7e131261
SHA256
165636ae818280faf776f4edd9637cc8e111b2278ce233fa8e8311b75bb3cdb4
SHA512
4c92f17cbf8bc42677fa97317cc42b63d3398ac024539306f89aeb90b512282484d3cd2814463e545da20f989fcad0f5f9721ca3af0ef6f4b97d7d384cb89445
SSDEEP
768:8Z2I7fc/zqbCP7yvVeiEZlhCDilRbBWbte:80Iw/zqA7QVeiEr8OlRbBWbte
Checks for missing Authenticode signature.
resource |
---|
6550d0b3dbe412662d8ca6076835e250_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
CreateThread
WaitForSingleObject
ReadFile
GetFileSize
SetFilePointer
GetLastError
CreateEventA
GetModuleFileNameA
GetTempPathA
GetWindowsDirectoryA
GetSystemDirectoryA
SetFileAttributesA
GetCommandLineA
MultiByteToWideChar
GlobalLock
CreateFileA
WriteFile
GlobalUnlock
GlobalFree
CloseHandle
GlobalAlloc
GetCurrentDirectoryA
DeleteFileA
GetModuleHandleA
Sleep
ExitProcess
IsBadReadPtr
LoadLibraryA
GetProcAddress
VirtualProtect
GetDesktopWindow
GetClientRect
CallWindowProcA
GetClassNameA
SetWindowLongA
RegisterShellHookWindow
RegisterWindowMessageA
GetDC
wsprintfA
ReleaseDC
EnumWindows
GetKeyboardState
MapVirtualKeyA
GetWindowTextA
ToAscii
GetParent
GetWindowThreadProcessId
GetWindowRect
CreateDCA
GetDeviceCaps
DeleteDC
GetObjectA
GetStockObject
DeleteObject
BitBlt
SelectObject
CreateCompatibleBitmap
CreateCompatibleDC
GetDIBits
RealizePalette
SelectPalette
GdipSaveImageToFile
GdipLoadImageFromFile
GdiplusStartup
GdipGetImageEncoders
GdipGetImageEncodersSize
GdipFree
GdipAlloc
GdipCloneImage
GdiplusShutdown
GdipDisposeImage
??0_Lockit@std@@QAE@XZ
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??0Init@ios_base@std@@QAE@XZ
??1Init@ios_base@std@@QAE@XZ
??0_Winit@std@@QAE@XZ
??1_Winit@std@@QAE@XZ
??1_Lockit@std@@QAE@XZ
connect
htons
gethostbyname
socket
recv
inet_ntoa
WSAStartup
send
WSACleanup
inet_addr
closesocket
InternetReadFile
InternetOpenUrlA
InternetOpenA
InternetCloseHandle
strrchr
_access
strcat
strchr
atoi
strncpy
strstr
abs
malloc
free
__dllonexit
_onexit
_initterm
_adjust_fdiv
_getpid
_stricmp
_strlwr
_strrev
wcscmp
??2@YAPAXI@Z
__CxxFrameHandler
strtok
sprintf
strlen
strcmp
memset
strcpy
memcpy
Netbios
COMResModuleInstance
DriverProc
KsCreateAllocator
KsCreatePin
KsCreateTopologyNode
ServerMain
modMessage
modmCallback
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ