COMResModuleInstance
DriverProc
KsCreateAllocator
KsCreatePin
KsCreateTopologyNode
ServerMain
modMessage
modmCallback
Static task
static1
Behavioral task
behavioral1
Sample
826e15dafba0887734ebd294b5a37bca_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
826e15dafba0887734ebd294b5a37bca_JaffaCakes118.dll
Resource
win10v2004-20240730-en
Target
826e15dafba0887734ebd294b5a37bca_JaffaCakes118
Size
32KB
MD5
826e15dafba0887734ebd294b5a37bca
SHA1
6c8f97de1b3cf3cc429819e3ad4a8b34dba67b46
SHA256
383884605ec39e43fa9ad9f28b2d61b3913fabedc381cdd70bf25f64ff50e2ca
SHA512
65c4bc8f153028631d3dbfe4a6656bf327d956e128f9dd968a6ed5ee9e755b950e778ae34c6c4a87f2e62f5e2227fb655020d5d5ab29a05d8b5575bb97a241b5
SSDEEP
768:hUDjbYjOVw9bJm7XJJvsiHBBzhA/ERghu8:h8wOVwhA7XJJvNHBpisRIB
Checks for missing Authenticode signature.
resource |
---|
826e15dafba0887734ebd294b5a37bca_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
SetFilePointer
GetLastError
CreateEventA
GetModuleFileNameA
GetTempPathA
GetWindowsDirectoryA
GetFileSize
SetFileAttributesA
ExitProcess
GetCommandLineA
GetPrivateProfileStringA
GetCurrentDirectoryA
IsBadReadPtr
GetModuleHandleA
ReadFile
WaitForSingleObject
CreateThread
Sleep
GetSystemDirectoryA
MultiByteToWideChar
DeleteFileA
GlobalLock
CreateFileA
WriteFile
GlobalUnlock
GlobalFree
CloseHandle
LoadLibraryA
GetProcAddress
GlobalAlloc
VirtualProtect
RegisterWindowMessageA
wsprintfA
RegisterShellHookWindow
GetWindowThreadProcessId
EnumWindows
GetWindowTextA
GetClassNameA
CallWindowProcA
GetClientRect
GetParent
GetWindowRect
GetDC
GetDesktopWindow
ReleaseDC
SetWindowLongA
CreateDCA
GetDeviceCaps
DeleteObject
BitBlt
SelectObject
CreateCompatibleBitmap
CreateCompatibleDC
GetDIBits
RealizePalette
SelectPalette
GetStockObject
GetObjectA
DeleteDC
GdiplusShutdown
GdipDisposeImage
GdiplusStartup
GdipGetImageEncoders
GdipGetImageEncodersSize
GdipFree
GdipAlloc
GdipCloneImage
GdipLoadImageFromFile
GdipSaveImageToFile
??0_Lockit@std@@QAE@XZ
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??0Init@ios_base@std@@QAE@XZ
??1Init@ios_base@std@@QAE@XZ
??0_Winit@std@@QAE@XZ
??1_Winit@std@@QAE@XZ
??1_Lockit@std@@QAE@XZ
connect
htons
gethostbyname
socket
recv
send
inet_ntoa
WSAStartup
WSACleanup
inet_addr
closesocket
InternetReadFile
InternetOpenUrlA
InternetOpenA
InternetCloseHandle
_access
strrchr
strcat
memset
strchr
atoi
strcmp
free
__dllonexit
_onexit
_initterm
_adjust_fdiv
_stricmp
_strlwr
_strrev
_getpid
strncmp
strncpy
strstr
abs
sprintf
malloc
wcscmp
strcpy
strlen
??2@YAPAXI@Z
memcpy
__CxxFrameHandler
Netbios
COMResModuleInstance
DriverProc
KsCreateAllocator
KsCreatePin
KsCreateTopologyNode
ServerMain
modMessage
modmCallback
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ