Hackms
ServiceMain
cnla
hackMs
tk
Static task
static1
Behavioral task
behavioral1
Sample
8d59182e4b397f9aa6c5d842ec396a2b_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
8d59182e4b397f9aa6c5d842ec396a2b_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
8d59182e4b397f9aa6c5d842ec396a2b_JaffaCakes118
Size
120KB
MD5
8d59182e4b397f9aa6c5d842ec396a2b
SHA1
c3191deaf2efd246c09195a52f5edac91f0978f5
SHA256
30335ce777ca165aa0233c4fdabf548d0fc241aaa96a92f8db5686a9e5e84b82
SHA512
17f50a29ec3c440c58479a74c6e62a2d8e2dd68d3724f387fef2a956f16deec0c3cc92ff14b9dd0ed32d326e0a6c5abc3fe19fa1471e2795b528fc46ec40c49e
SSDEEP
1536:Hw61FVyv06sKXTFME31ahhSWlGZC+KHo3gD63dB0IO5nToIftGgPstU0PnyTEfJS:HlorZMEly+KIK63+RTBftGgPstU0PDiv
Checks for missing Authenticode signature.
resource |
---|
8d59182e4b397f9aa6c5d842ec396a2b_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
MoveFileExA
GetLocalTime
MapViewOfFile
CreateFileMappingA
HeapFree
GetProcessHeap
HeapAlloc
UnmapViewOfFile
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalSize
LocalSize
GetStartupInfoA
CreatePipe
SetLastError
OutputDebugStringA
PeekNamedPipe
WaitForMultipleObjects
GlobalMemoryStatusEx
GetSystemInfo
ReleaseMutex
OpenEventA
SetErrorMode
CreateMutexA
SetUnhandledExceptionFilter
FreeConsole
GetTempPathA
GetComputerNameA
lstrcmpiA
GetCurrentThreadId
VirtualAllocEx
WriteProcessMemory
CreateRemoteThread
GetTickCount
ExitThread
TerminateProcess
OpenProcess
GetModuleFileNameA
MoveFileA
Beep
SetFilePointer
ReadFile
CreateFileA
GetFileSize
RemoveDirectoryA
LocalAlloc
FindFirstFileA
LocalReAlloc
FindNextFileA
LocalFree
FindClose
GetLogicalDriveStringsA
GetVolumeInformationA
GetDiskFreeSpaceExA
GetDriveTypeA
CreateProcessA
GetFileAttributesA
CreateDirectoryA
GetLastError
DeleteFileA
GetVersionExA
GetPrivateProfileStringA
lstrcmpA
WideCharToMultiByte
MultiByteToWideChar
LoadLibraryA
GetProcAddress
FreeLibrary
GetWindowsDirectoryA
lstrcatA
GetPrivateProfileSectionNamesA
lstrlenA
Sleep
CancelIo
InterlockedExchange
lstrcpyA
ResetEvent
VirtualAlloc
EnterCriticalSection
LeaveCriticalSection
VirtualFree
DeleteCriticalSection
InitializeCriticalSection
CreateEventA
CreateThread
ResumeThread
SetEvent
WaitForSingleObject
TerminateThread
CreateToolhelp32Snapshot
Process32First
Process32Next
DeviceIoControl
GetVersion
GetCurrentProcess
ExitProcess
WriteFile
GetSystemDirectoryA
CloseHandle
DisconnectNamedPipe
SystemParametersInfoA
keybd_event
MapVirtualKeyA
SetCapture
WindowFromPoint
SetCursorPos
mouse_event
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
GetClipboardData
GetSystemMetrics
SetRect
GetDC
LoadCursorA
ReleaseDC
BlockInput
GetCursorInfo
SetProcessWindowStation
OpenWindowStationA
GetProcessWindowStation
GetWindowThreadProcessId
IsWindowVisible
EnumWindows
IsWindow
CloseWindow
CreateWindowExA
UnhookWindowsHookEx
SetWindowsHookExA
CallNextHookEx
GetKeyNameTextA
GetActiveWindow
GetForegroundWindow
DispatchMessageA
MoveWindow
GetCursorPos
DestroyCursor
GetWindowTextA
SendMessageA
SwapMouseButton
ShowWindow
TranslateMessage
GetMessageA
wsprintfA
CharNextA
MessageBoxA
ExitWindowsEx
FindWindowA
GetDesktopWindow
GetWindowRect
PostMessageA
OpenDesktopA
GetThreadDesktop
GetUserObjectInformationA
OpenInputDesktop
SetThreadDesktop
CloseDesktop
DeleteObject
BitBlt
CreateDIBSection
SelectObject
CreateCompatibleBitmap
GetDIBits
CreateCompatibleDC
DeleteDC
RegQueryValueA
IsValidSid
LsaClose
LsaRetrievePrivateData
LsaOpenPolicy
LsaFreeMemory
RegCloseKey
RegOpenKeyExA
CloseServiceHandle
DeleteService
ControlService
QueryServiceStatus
OpenServiceA
OpenSCManagerA
RegSetValueExA
RegCreateKeyA
RegQueryValueExA
RegOpenKeyA
CloseEventLog
ClearEventLogA
OpenEventLogA
RegCreateKeyExA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
FreeSid
SetSecurityDescriptorDacl
AddAccessAllowedAce
InitializeAcl
GetLengthSid
AllocateAndInitializeSid
InitializeSecurityDescriptor
RegEnumKeyExA
RegEnumValueA
RegDeleteKeyA
RegDeleteValueA
UnlockServiceDatabase
ChangeServiceConfigA
LockServiceDatabase
StartServiceA
QueryServiceConfigA
EnumServicesStatusA
RegisterServiceCtrlHandlerA
SetServiceStatus
GetUserNameA
LookupAccountSidA
GetTokenInformation
LookupAccountNameA
SHGetSpecialFolderPathA
SHGetFileInfoA
SHDeleteKeyA
_strnicmp
_strrev
_strupr
_strcmpi
_adjust_fdiv
_initterm
_beginthreadex
wcstombs
realloc
strncat
time
srand
rand
_snprintf
wcscpy
_errno
strncmp
atoi
strncpy
strcat
strrchr
_except_handler3
free
strcmp
strcpy
malloc
strchr
memcmp
strstr
strlen
_ftol
ceil
memmove
__CxxFrameHandler
memcpy
??3@YAXPAX@Z
??2@YAPAXI@Z
memset
waveInReset
waveInStop
waveOutWrite
waveInStart
waveInAddBuffer
waveInPrepareHeader
waveInUnprepareHeader
waveInGetNumDevs
waveOutPrepareHeader
waveOutOpen
waveOutGetNumDevs
mciSendStringA
waveInClose
waveOutClose
waveOutUnprepareHeader
waveInOpen
waveOutReset
htons
connect
gethostbyname
WSACleanup
bind
socket
closesocket
ntohs
recv
WSAStartup
select
send
inet_ntoa
inet_addr
getsockname
WSAGetLastError
htonl
gethostname
WSASocketA
ioctlsocket
__WSAFDIsSet
recvfrom
sendto
listen
accept
getpeername
WSAIoctl
setsockopt
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
NetLocalGroupAddMembers
NetUserAdd
ImmReleaseContext
ImmGetContext
ImmGetCompositionStringA
InternetCloseHandle
InternetOpenUrlA
InternetOpenA
InternetReadFile
capGetDriverDescriptionA
capCreateCaptureWindowA
ICOpen
ICSeqCompressFrameEnd
ICSeqCompressFrame
ICSeqCompressFrameStart
ICSendMessage
ICClose
ICCompressorFree
EnumProcesses
GetModuleFileNameExA
EnumProcessModules
GetModuleBaseNameA
WTSFreeMemory
WTSQuerySessionInformationA
Hackms
ServiceMain
cnla
hackMs
tk
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ