?dnfCallBack@@YGJHIJ@Z
myIns
Static task
static1
Behavioral task
behavioral1
Sample
8e698b9c8d9243af8d6bffc0f854c800_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
8e698b9c8d9243af8d6bffc0f854c800_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
8e698b9c8d9243af8d6bffc0f854c800_JaffaCakes118
Size
20KB
MD5
8e698b9c8d9243af8d6bffc0f854c800
SHA1
13b50fa8c0628e1b455620534f2f22377fdae2b2
SHA256
44d13373c629956c149306be6083430110e97b211d25f74f59127bf8cd7b355a
SHA512
98d768ea70ab62c5c2872d7cc3ae90a6d0847432f5499b5af505503c25d3b4fd17d3725b74304d34d649734760b75aebdf378e4e865a87de94f40abed9189dc1
SSDEEP
384:vwxITWBZhB7cFt6il7MkqyWrER8H5FME:Z6+Ail77qxre8ZC
Checks for missing Authenticode signature.
resource |
---|
8e698b9c8d9243af8d6bffc0f854c800_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
htons
inet_addr
socket
WSACleanup
send
closesocket
connect
recv
inet_ntoa
gethostbyname
WSAStartup
CoCreateInstance
CoInitialize
CoUninitialize
PathFileExistsA
_adjust_fdiv
_initterm
free
_onexit
__dllonexit
_access
rename
remove
sscanf
fread
strchr
strstr
wcscmp
malloc
strncpy
sprintf
fopen
strtok
fgets
fclose
_stricmp
GdiplusStartup
GdipCloneImage
GdipAlloc
GdipGetImageEncoders
GdipGetImageEncodersSize
GdipDisposeImage
GdipSaveImageToFile
GdipLoadImageFromFile
GdipFree
ord800
ord537
lstrlenA
CreateToolhelp32Snapshot
Process32First
Process32Next
LoadLibraryA
GetProcAddress
VirtualProtect
ExitProcess
GetFileSize
GetSystemDirectoryA
GetModuleFileNameA
TerminateProcess
CopyFileA
GetLocalTime
DeleteFileA
OpenProcess
GlobalUnlock
GlobalAlloc
GlobalLock
CreateFileA
WriteFile
GlobalFree
CloseHandle
FindNextFileA
FindFirstFileA
MultiByteToWideChar
CompareFileTime
Sleep
CreateThread
GetWindowRect
CallNextHookEx
ReleaseDC
GetDesktopWindow
GetDC
DeleteObject
CreateDCA
GetDeviceCaps
GetObjectA
GetStockObject
SelectPalette
RealizePalette
GetDIBits
SelectObject
CreateCompatibleDC
CreateCompatibleBitmap
BitBlt
DeleteDC
RegSetValueExA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
ShellExecuteA
SHGetSpecialFolderPathA
GetAdaptersInfo
?dnfCallBack@@YGJHIJ@Z
myIns
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ