Install
_Install@16
Static task
static1
Behavioral task
behavioral1
Sample
6496f3858b4e913eb252f35d0b02f25a_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
6496f3858b4e913eb252f35d0b02f25a_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
6496f3858b4e913eb252f35d0b02f25a_JaffaCakes118
Size
67KB
MD5
6496f3858b4e913eb252f35d0b02f25a
SHA1
74cce267e2707b58f695ccfa9e284caa6c9be141
SHA256
5c04c6d5257d632b4a235665812425d5dec528157756aa909c21c09478a64b10
SHA512
38a772c373da39d0b58d9008f310dadfac27ef9e3c18af5a4dd4fdbecded60c0ffcb925688cc531ca3ba8182352b6a6b1debf9baf0592f8f5594f39fd958bdcd
SSDEEP
768:q8T3q8yZUIm0ZqbMIKQMH7oZP0pjN4nxJ06qpZ:FyUIm0hDQMH64sqbp
Checks for missing Authenticode signature.
resource |
---|
6496f3858b4e913eb252f35d0b02f25a_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
WriteFile
MultiByteToWideChar
ReleaseMutex
VirtualFreeEx
VirtualAllocEx
FindClose
FindNextFileA
lstrcmpiA
lstrcatA
GetCurrentProcess
Module32First
VirtualProtectEx
CreateMutexA
DeleteFileA
GetModuleFileNameA
CopyFileA
TerminateProcess
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
IsBadReadPtr
GetTempPathA
GetModuleHandleA
LocalAlloc
CreateFileA
InitializeCriticalSection
GetFileSize
ReadFile
LocalFree
GetLastError
CloseHandle
GetCurrentProcessId
DisableThreadLibraryCalls
WaitForSingleObject
Sleep
LoadLibraryA
GetProcAddress
WinExec
lstrcpyA
lstrlenA
GetTickCount
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
wsprintfA
GetWindowThreadProcessId
EnumWindows
SetThreadDesktop
OpenWindowStationA
IsRectEmpty
ReleaseDC
GetDC
GetWindowTextA
GetForegroundWindow
GetWindowRect
OpenDesktopA
GetObjectA
DeleteDC
BitBlt
SelectObject
CreateCompatibleBitmap
GetDeviceCaps
CreateCompatibleDC
CreateDCA
GetDIBits
RealizePalette
SelectPalette
GetStockObject
SetSecurityDescriptorDacl
OpenProcessToken
LookupPrivilegeValueA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ID@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBDABV?$allocator@D@1@@Z
?find@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDII@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?replace@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@IIABV12@II@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
getpeername
WSAStartup
closesocket
send
recv
select
connect
ioctlsocket
htons
socket
gethostbyname
strrchr
??2@YAPAXI@Z
strcpy
memcmp
atoi
_beginthreadex
strlen
sprintf
_mbsnbcpy
_mbsnbcmp
atol
_mbscmp
free
malloc
sscanf
strcat
__CxxFrameHandler
isprint
memcpy
memset
_onexit
__dllonexit
strncpy
strstr
_purecall
_splitpath
wcscmp
strchr
StrStrIA
MakeSureDirectoryPathExists
HttpOpenRequestA
HttpQueryInfoA
InternetReadFile
HttpSendRequestExA
InternetWriteFile
HttpEndRequestA
HttpAddRequestHeadersA
HttpSendRequestA
InternetCloseHandle
InternetOpenA
InternetConnectA
InternetAttemptConnect
GdipAlloc
GdipDisposeImage
GdipGetImageEncoders
GdipGetImageEncodersSize
GdiplusShutdown
GdipSaveImageToFile
GdiplusStartup
GdipFree
GdipCreateBitmapFromFile
GdipCreateBitmapFromFileICM
GdipCloneImage
Install
_Install@16
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ