CanUnloadNow
CreateMsgHistory
CreatePluginModule
GetClassObject
RegisterServer
ServiceMain
UnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
6f61109e5317de062fd12cbcb7e34634_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
6f61109e5317de062fd12cbcb7e34634_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Target
6f61109e5317de062fd12cbcb7e34634_JaffaCakes118
Size
120KB
MD5
6f61109e5317de062fd12cbcb7e34634
SHA1
121bad55c91e859328b04fc2b73e8d8fe752cbc0
SHA256
de735c114b8f03473b65a9f9b3e14765bbf0ff60912e30a1161e1224e62c4ead
SHA512
7f8a96526debc22875e72d0ddfdc83ae9dd1da45dde7a6ded6287805fa1f7ad578e33ad336e911b89c4d868efd4919b711583b8d9a1c9019a70dd52c65ea60e3
SSDEEP
3072:ikrZIv72IbINQXLi/eao5/RXcXxo/WizWJbZ08bN/:Xrs2IbINQXtr/J4o/WizWRZ0gN
Checks for missing Authenticode signature.
resource |
---|
6f61109e5317de062fd12cbcb7e34634_JaffaCakes118 |
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
CreateMutexA
SetErrorMode
GetModuleHandleA
OpenEventA
FindResourceA
SizeofResource
LoadResource
CreateFileA
WriteFile
GetModuleFileNameA
GetComputerNameA
GetCurrentThreadId
TerminateProcess
GetStartupInfoA
GlobalSize
GlobalLock
GlobalUnlock
GlobalFree
UnmapViewOfFile
HeapFree
CreateFileMappingA
MapViewOfFile
InitializeCriticalSection
MoveFileA
GetProcAddress
SetFilePointer
ReadFile
GetFileSize
LocalFree
FindClose
GetVolumeInformationA
lstrlenA
lstrcpyA
MultiByteToWideChar
WideCharToMultiByte
GetVersionExA
GetPrivateProfileStringA
GetCurrentProcessId
GetLocalTime
GetLastError
VirtualAlloc
LeaveCriticalSection
VirtualFree
DeleteCriticalSection
CloseHandle
LoadLibraryA
LoadMenuA
RegisterClassA
LoadIconA
CloseDesktop
TranslateMessage
GetMessageA
wsprintfA
CharNextA
GetWindowTextA
MessageBoxA
LoadCursorA
BlockInput
SendMessageA
keybd_event
MapVirtualKeyA
SetCapture
WindowFromPoint
SetCursorPos
mouse_event
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
GetClipboardData
GetSystemMetrics
SetRect
GetDC
GetDesktopWindow
ReleaseDC
GetCursorPos
DestroyCursor
GetCursorInfo
GetWindowThreadProcessId
IsWindowVisible
OpenInputDesktop
GetUserObjectInformationA
GetThreadDesktop
CreateWindowExA
CloseWindow
IsWindow
PostMessageA
DispatchMessageA
GetStockObject
AddAccessAllowedAce
RegDeleteKeyA
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
IsValidSid
LookupAccountNameA
LsaClose
LsaRetrievePrivateData
LsaOpenPolicy
LsaFreeMemory
CloseEventLog
ClearEventLogA
OpenEventLogA
RegSetValueExA
RegCreateKeyExA
CloseServiceHandle
DeleteService
OpenServiceA
OpenSCManagerA
FreeSid
SetSecurityDescriptorDacl
InitializeAcl
GetLengthSid
AllocateAndInitializeSid
InitializeSecurityDescriptor
LookupAccountSidA
GetTokenInformation
OpenProcessToken
RegOpenKeyA
SetServiceStatus
RegisterServiceCtrlHandlerA
AdjustTokenPrivileges
LookupPrivilegeValueA
RegSaveKeyA
RegRestoreKeyA
ShellExecuteA
SHGetSpecialFolderPathA
CoCreateGuid
CoInitialize
CoUninitialize
strncpy
??1exception@@UAE@XZ
??0exception@@QAE@ABV0@@Z
_stricmp
_strcmpi
_strnicmp
_strnset
_strrev
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
_onexit
__dllonexit
??1type_info@@UAE@XZ
calloc
wcstombs
_snprintf
_beginthreadex
_errno
strcat
strncmp
atoi
strrchr
_except_handler3
free
malloc
strcmp
strchr
??0exception@@QAE@ABQBD@Z
sprintf
strcpy
rand
memcmp
strstr
strlen
_ftol
ceil
memset
??2@YAPAXI@Z
putchar
??3@YAXPAX@Z
memcpy
puts
__CxxFrameHandler
_CxxThrowException
memmove
gethostbyname
socket
recv
select
closesocket
send
inet_addr
connect
sendto
WSASocketA
htonl
inet_ntoa
getsockname
bind
recvfrom
__WSAFDIsSet
WSAStartup
WSACleanup
WSAIoctl
htons
setsockopt
WTSQuerySessionInformationA
WTSFreeMemory
CanUnloadNow
CreateMsgHistory
CreatePluginModule
GetClassObject
RegisterServer
ServiceMain
UnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ