COMResModuleInstance
DriverProc
KsCreateAllocator
KsCreatePin
KsCreateTopologyNode
ServerMain
modMessage
modmCallback
Static task
static1
Behavioral task
behavioral1
Sample
881fb554157710456e2dec140da842e4_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
881fb554157710456e2dec140da842e4_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
881fb554157710456e2dec140da842e4_JaffaCakes118
Size
35KB
MD5
881fb554157710456e2dec140da842e4
SHA1
8ebe56d00d82cc1f03570b4f5f8f859e5eafe9e0
SHA256
cf98a30255b404385ee7540b17eb515701d3299fc1e5792450f05abecec517a2
SHA512
2c083d909cc3a0b2bc7f920824afbab2c8f6fce25ca024ca560fc9aed63a748019b825049394470af1f36e3fc0ceaeac7545d937f4e05d7c515c8791cfde1c41
SSDEEP
384:Hxw6CL9YMSyIS8st4rVUyzWTNk2/HysQgD77+6HTHICawCJFX9W+RkhfODP:HHCSyIS1t4j2Z/tD7zH8ChwZ9vRAs
Checks for missing Authenticode signature.
resource |
---|
881fb554157710456e2dec140da842e4_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
CreateEventA
GetModuleFileNameA
GetTempPathA
GetWindowsDirectoryA
CreateToolhelp32Snapshot
GetLastError
TerminateProcess
OpenProcess
SetFileAttributesA
GetCommandLineA
SetFilePointer
GetFileSize
ReadFile
WaitForSingleObject
GetSystemDirectoryA
MultiByteToWideChar
DeleteFileA
GlobalLock
CreateFileA
WriteFile
GlobalUnlock
GlobalFree
CloseHandle
LoadLibraryA
GetProcAddress
GlobalAlloc
VirtualProtect
ExitProcess
CreateThread
IsBadReadPtr
Sleep
GetParent
GetWindowThreadProcessId
ReleaseDC
wsprintfA
GetWindowTextA
GetWindowRect
GetDC
GetDesktopWindow
GetClientRect
CallWindowProcA
GetClassNameA
SetWindowLongA
RegisterShellHookWindow
RegisterWindowMessageA
SelectObject
CreateCompatibleBitmap
DeleteObject
GetDIBits
RealizePalette
SelectPalette
GetStockObject
GetObjectA
DeleteDC
GetDeviceCaps
CreateDCA
CreateCompatibleDC
BitBlt
CryptHashData
CryptGetHashParam
CryptCreateHash
CryptAcquireContextA
GdipCloneImage
GdipAlloc
GdipFree
GdipGetImageEncodersSize
GdipGetImageEncoders
GdiplusStartup
GdipDisposeImage
GdiplusShutdown
GdipLoadImageFromFile
GdipSaveImageToFile
??1_Lockit@std@@QAE@XZ
??0_Lockit@std@@QAE@XZ
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??0Init@ios_base@std@@QAE@XZ
??1Init@ios_base@std@@QAE@XZ
??0_Winit@std@@QAE@XZ
??1_Winit@std@@QAE@XZ
WSAStartup
send
recv
socket
inet_addr
htons
connect
gethostbyname
inet_ntoa
closesocket
WSACleanup
strrchr
_access
strcat
strchr
atoi
abs
malloc
free
__dllonexit
_onexit
_initterm
_adjust_fdiv
_getpid
_stricmp
_strlwr
_strrev
wcscmp
??2@YAPAXI@Z
memcpy
__CxxFrameHandler
strncmp
strstr
memset
sprintf
strncpy
strcmp
strcpy
strlen
Netbios
COMResModuleInstance
DriverProc
KsCreateAllocator
KsCreatePin
KsCreateTopologyNode
ServerMain
modMessage
modmCallback
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ