CodeHello
CodeMain
HelloService
MainCode
Static task
static1
Behavioral task
behavioral1
Sample
7425489ac53e3fe05ec1825f051a1708_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
7425489ac53e3fe05ec1825f051a1708_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
7425489ac53e3fe05ec1825f051a1708_JaffaCakes118
Size
108KB
MD5
7425489ac53e3fe05ec1825f051a1708
SHA1
a214b4d011d16e4e0e1be353fc3ee1881ff459f9
SHA256
a5e02aea5532a0a14aed185ad1776cce406136d6c3274fdf349ff5c07306e95a
SHA512
7df1c512fbe423727932e2c88e8099a4d7620a9add67c6bf4c05b23831cf0e500f411f51c0729dc3ba43c91f3c0d78780c15fdd60257afc2bcadafb1b24985bb
SSDEEP
3072:TnrIEY6eRzdS0ERzxbkQ8oBXh4KsuIDt2:TkdD7S06rtXStxh2
Checks for missing Authenticode signature.
resource |
---|
7425489ac53e3fe05ec1825f051a1708_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
MoveFileExA
GetTickCount
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalSize
GetStartupInfoA
CreatePipe
DisconnectNamedPipe
PeekNamedPipe
WaitForMultipleObjects
GetLocalTime
GlobalMemoryStatus
GetSystemInfo
ReleaseMutex
OpenEventA
SetErrorMode
CreateMutexA
SetUnhandledExceptionFilter
FreeConsole
TerminateProcess
LocalSize
lstrcmpiA
GetCurrentThreadId
GetSystemDirectoryA
VirtualAllocEx
WriteProcessMemory
CreateRemoteThread
GetCurrentProcess
lstrcatA
CreateProcessA
GetWindowsDirectoryA
CreateToolhelp32Snapshot
Process32First
Process32Next
SetLastError
GetModuleFileNameA
SetFilePointer
lstrlenA
MoveFileA
WriteFile
ReadFile
CreateFileA
GetFileSize
RemoveDirectoryA
LocalAlloc
LocalReAlloc
LocalFree
FindClose
GetDiskFreeSpaceExA
CreateDirectoryA
GetLastError
DeleteFileA
GetVersionExA
GetPrivateProfileStringA
lstrcmpA
WideCharToMultiByte
MultiByteToWideChar
FreeLibrary
OpenProcess
GetFileAttributesA
Sleep
CancelIo
InterlockedExchange
lstrcpyA
ResetEvent
VirtualAlloc
EnterCriticalSection
LeaveCriticalSection
VirtualFree
DeleteCriticalSection
CreateThread
ResumeThread
SetEvent
WaitForSingleObject
LoadLibraryA
GetProcAddress
TerminateThread
CloseHandle
CreateEventA
DeviceIoControl
DestroyCursor
BlockInput
SendMessageA
SystemParametersInfoA
keybd_event
MapVirtualKeyA
SetCapture
WindowFromPoint
SetCursorPos
mouse_event
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
GetClipboardData
GetSystemMetrics
GetAsyncKeyState
GetDC
GetDesktopWindow
ReleaseDC
GetCursorPos
GetCursorInfo
SetProcessWindowStation
LoadCursorA
GetProcessWindowStation
GetWindowThreadProcessId
IsWindow
CloseWindow
CreateWindowExA
PostMessageA
OpenDesktopA
GetForegroundWindow
GetWindowTextA
MessageBoxA
ExitWindowsEx
CharNextA
wsprintfA
GetMessageA
IsWindowVisible
EnumWindows
CloseDesktop
SetThreadDesktop
OpenInputDesktop
GetUserObjectInformationA
GetThreadDesktop
TranslateMessage
DispatchMessageA
OpenWindowStationA
GetKeyState
SetRect
CreateCompatibleBitmap
GetDIBits
SelectObject
CreateDIBSection
CreateCompatibleDC
DeleteObject
DeleteDC
BitBlt
RegQueryValueExA
GetTokenInformation
LookupAccountSidA
SetServiceStatus
RegisterServiceCtrlHandlerA
DuplicateTokenEx
SetTokenInformation
RegDeleteValueA
OpenProcessToken
IsValidSid
LookupAccountNameA
LsaOpenPolicy
LsaFreeMemory
RegCloseKey
RegQueryValueA
RegOpenKeyExA
CloseServiceHandle
DeleteService
ControlService
QueryServiceStatus
OpenServiceA
OpenSCManagerA
RegSetValueExA
RegCreateKeyA
RegOpenKeyA
RegCreateKeyExA
CreateProcessAsUserA
CloseEventLog
ClearEventLogA
OpenEventLogA
AdjustTokenPrivileges
LookupPrivilegeValueA
RegEnumKeyExA
RegEnumValueA
RegDeleteKeyA
SHGetFileInfoA
SHGetSpecialFolderPathA
SHDeleteKeyA
_strrev
_stricmp
_strcmpi
_strnicmp
strcmp
_strnset
_adjust_fdiv
_initterm
calloc
_beginthreadex
wcstombs
strtok
srand
rand
strncat
fopen
fwrite
fclose
strchr
_snprintf
_errno
sprintf
strncmp
atoi
strncpy
strcat
strrchr
malloc
free
_strupr
_except_handler3
strcpy
memcmp
strstr
strlen
_ftol
ceil
memmove
__CxxFrameHandler
memcpy
??3@YAXPAX@Z
??2@YAPAXI@Z
memset
waveInGetNumDevs
waveOutOpen
waveInStart
waveInPrepareHeader
waveInAddBuffer
waveOutPrepareHeader
__WSAFDIsSet
GetProfilesDirectoryA
GetUserProfileDirectoryA
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
ICSeqCompressFrame
ICSeqCompressFrameStart
ICSendMessage
ICSeqCompressFrameEnd
ICOpen
ICClose
ICCompressorFree
EnumProcessModules
GetProcessMemoryInfo
GetModuleFileNameExA
CodeHello
CodeMain
HelloService
MainCode
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ