Inse
_Inse@16
Static task
static1
Behavioral task
behavioral1
Sample
7463ffd9127eb3c60a957e38cbf697b2_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
7463ffd9127eb3c60a957e38cbf697b2_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
7463ffd9127eb3c60a957e38cbf697b2_JaffaCakes118
Size
60KB
MD5
7463ffd9127eb3c60a957e38cbf697b2
SHA1
8dcd0c2f9268ffecdf49188987ce87a90897977c
SHA256
42e9f88c8fc2ceb7d1efdcd3a914cc476a894b29713c6d7db7c1feb827564654
SHA512
09b40c8fb0e4411a7b9de183565751e2f4ddfa00c63bf415e3b2024960db80d34143be8df6a43ba87513a379779f09733c27ac8b42ca48eacf0bce0fe8a48ebc
SSDEEP
768:xqY+OXzBxjpkmC7RzVTfK49gN4UxOpp/3lOi:QIhprC7vJ9OOpp/l/
Checks for missing Authenticode signature.
resource |
---|
7463ffd9127eb3c60a957e38cbf697b2_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
VirtualFreeEx
VirtualAllocEx
FindClose
FindNextFileA
lstrcmpiA
lstrcatA
GetCurrentProcess
Module32First
VirtualProtectEx
ReleaseMutex
CreateMutexA
DeleteFileA
GetModuleFileNameA
CopyFileA
TerminateProcess
GlobalFree
GlobalUnlock
DisableThreadLibraryCalls
IsBadReadPtr
lstrlenW
WideCharToMultiByte
MultiByteToWideChar
InitializeCriticalSection
GetTempPathA
GetModuleHandleA
CreateFileA
GetFileSize
ReadFile
GetLastError
CloseHandle
GetCurrentProcessId
WaitForSingleObject
Sleep
LoadLibraryA
GetProcAddress
WinExec
lstrcpyA
lstrlenA
GetTickCount
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
GetForegroundWindow
GetWindowRect
GetDC
ReleaseDC
OpenWindowStationA
SetProcessWindowStation
OpenDesktopA
wsprintfA
GetWindowThreadProcessId
EnumWindows
SetThreadDesktop
GetNearestPaletteIndex
DeleteObject
GetPaletteEntries
CreateHalftonePalette
SetSecurityDescriptorDacl
OpenProcessToken
LookupPrivilegeValueA
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ID@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
htons
ioctlsocket
connect
select
recv
send
getpeername
closesocket
WSAStartup
gethostbyname
socket
strchr
strstr
malloc
wcscmp
_splitpath
_purecall
rand
srand
__dllonexit
_onexit
sscanf
fflush
free
strlen
sprintf
_itoa
fopen
fwrite
fputc
memset
memcpy
__CxxFrameHandler
??2@YAPAXI@Z
strcat
strrchr
strcpy
atoi
strcmp
_beginthreadex
fclose
StrStrIA
MakeSureDirectoryPathExists
Inse
_Inse@16
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ