COMResModuleInstance
DriverProc
KsCreateAllocator
KsCreatePin
KsCreateTopologyNode
ServerMain
modMessage
modmCallback
Static task
static1
Behavioral task
behavioral1
Sample
726b8f1fc377680940db6b844e4207f5_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
726b8f1fc377680940db6b844e4207f5_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
726b8f1fc377680940db6b844e4207f5_JaffaCakes118
Size
32KB
MD5
726b8f1fc377680940db6b844e4207f5
SHA1
528423f9e42554737f161d36eecf411fc77077e5
SHA256
66c23f4d8834056cd4f03e4869604fc40468b7606b4406768932c787b3ac03cd
SHA512
7c78dbf8ee5a25810276c9e469afdbaeda4e95fd459d2ae5aa3c3d9207edcac31317112d10fdee7e7a63b2c09836a6f17990d7c932e05d1f675ead762c5583f6
SSDEEP
768:CUDjbYjOVw9bJm7XJJvsiHBBzhA/ERghu8:C8wOVwhA7XJJvNHBpisRIB
Checks for missing Authenticode signature.
resource |
---|
726b8f1fc377680940db6b844e4207f5_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
SetFilePointer
GetLastError
CreateEventA
GetModuleFileNameA
GetTempPathA
GetWindowsDirectoryA
GetFileSize
SetFileAttributesA
ExitProcess
GetCommandLineA
GetPrivateProfileStringA
GetCurrentDirectoryA
IsBadReadPtr
GetModuleHandleA
ReadFile
WaitForSingleObject
CreateThread
Sleep
GetSystemDirectoryA
MultiByteToWideChar
DeleteFileA
GlobalLock
CreateFileA
WriteFile
GlobalUnlock
GlobalFree
CloseHandle
LoadLibraryA
GetProcAddress
GlobalAlloc
VirtualProtect
RegisterWindowMessageA
wsprintfA
RegisterShellHookWindow
GetWindowThreadProcessId
EnumWindows
GetWindowTextA
GetClassNameA
CallWindowProcA
GetClientRect
GetParent
GetWindowRect
GetDC
GetDesktopWindow
ReleaseDC
SetWindowLongA
CreateDCA
GetDeviceCaps
DeleteObject
BitBlt
SelectObject
CreateCompatibleBitmap
CreateCompatibleDC
GetDIBits
RealizePalette
SelectPalette
GetStockObject
GetObjectA
DeleteDC
GdiplusShutdown
GdipDisposeImage
GdiplusStartup
GdipGetImageEncoders
GdipGetImageEncodersSize
GdipFree
GdipAlloc
GdipCloneImage
GdipLoadImageFromFile
GdipSaveImageToFile
??0_Lockit@std@@QAE@XZ
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??0Init@ios_base@std@@QAE@XZ
??1Init@ios_base@std@@QAE@XZ
??0_Winit@std@@QAE@XZ
??1_Winit@std@@QAE@XZ
??1_Lockit@std@@QAE@XZ
connect
htons
gethostbyname
socket
recv
send
inet_ntoa
WSAStartup
WSACleanup
inet_addr
closesocket
InternetReadFile
InternetOpenUrlA
InternetOpenA
InternetCloseHandle
_access
strrchr
strcat
memset
strchr
atoi
strcmp
free
__dllonexit
_onexit
_initterm
_adjust_fdiv
_stricmp
_strlwr
_strrev
_getpid
strncmp
strncpy
strstr
abs
sprintf
malloc
wcscmp
strcpy
strlen
??2@YAPAXI@Z
memcpy
__CxxFrameHandler
Netbios
COMResModuleInstance
DriverProc
KsCreateAllocator
KsCreatePin
KsCreateTopologyNode
ServerMain
modMessage
modmCallback
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ