DllRegisterServer
ServiceHandler
ServiceMain
Static task
static1
Behavioral task
behavioral1
Sample
a0251262ad4d673374f2d7952a82283f_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a0251262ad4d673374f2d7952a82283f_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
a0251262ad4d673374f2d7952a82283f_JaffaCakes118
Size
65KB
MD5
a0251262ad4d673374f2d7952a82283f
SHA1
d4d5031c0f10bc066390e0ce3217bf28837c85fd
SHA256
4c55f0456c45148ad8a0ce5edd5a3293797cdadeb1f3fd1197379ba473840049
SHA512
e9adc0f819d23ed6b248c17cd20c32777eb41b3522fe79423da94c24b58b23f760a52b3bcb96ecc50025f69a4a8ff971ec389231b51c46e3f7992bdd068f0848
SSDEEP
768:Fc5qYbELg0lR4vR87M54goZHOttoqp4LXc+oWY8euZ1g9UcqUNxt+k4fHAcpSmIE:FcBrToktb4IJfUHUNh4kxLNsd96
Checks for missing Authenticode signature.
resource |
---|
a0251262ad4d673374f2d7952a82283f_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
memset
strncpy
strlen
memmove
_strnicmp
strncmp
_strdup
free
sprintf
memcpy
wcslen
strcat
strcpy
strcmp
??2@YAPAXI@Z
??3@YAXPAX@Z
HeapCreate
HeapDestroy
MoveFileA
GetCurrentProcess
OpenProcess
CreateProcessA
CloseHandle
Sleep
FindFirstFileA
FindClose
CreateFileA
SetFileTime
GetDriveTypeA
SetCurrentDirectoryA
SetFileAttributesA
GetWindowsDirectoryA
CreateToolhelp32Snapshot
Process32First
Process32Next
GetModuleHandleA
GetModuleFileNameA
GetLastError
TerminateProcess
GetSystemDirectoryA
ExitProcess
EnterCriticalSection
WaitForSingleObject
LeaveCriticalSection
InitializeCriticalSection
HeapFree
HeapAlloc
CreateThread
TerminateThread
GetTickCount
WideCharToMultiByte
FreeLibrary
LoadLibraryA
GetProcAddress
DeleteFileA
FindNextFileA
RemoveDirectoryA
CreateDirectoryA
GetFileAttributesA
CopyFileA
WriteFile
GetFileSize
SetFilePointer
ReadFile
HeapReAlloc
WaitForMultipleObjects
ResetEvent
SetEvent
TlsGetValue
TlsSetValue
GetCurrentThread
DuplicateHandle
TlsAlloc
CreateEventA
MultiByteToWideChar
FindResourceA
LoadResource
SizeofResource
DeviceIoControl
GlobalAlloc
LoadLibraryExA
GlobalFree
lstrcatA
GetClassNameA
CreateDesktopA
OpenDesktopA
EnumDesktopWindows
CloseDesktop
GetForegroundWindow
GetWindowTextA
GetWindowThreadProcessId
EnumChildWindows
MoveWindow
ShowWindow
RegisterWindowMessageA
SendMessageTimeoutA
PostMessageA
OpenProcessToken
CreateProcessAsUserA
RegOpenKeyExA
RegDeleteKeyA
RegCloseKey
RegQueryValueExA
RegSetValueExA
RegisterServiceCtrlHandlerA
SetServiceStatus
OpenSCManagerA
CreateServiceA
CloseServiceHandle
RegCreateKeyExA
QueryServiceStatus
StartServiceA
LookupPrivilegeValueA
AdjustTokenPrivileges
RegEnumKeyExA
RegOpenKeyA
RegDeleteValueA
OpenServiceA
ControlService
SysAllocString
WSAStartup
htons
inet_addr
socket
connect
send
closesocket
sendto
gethostbyname
WSACleanup
gethostname
GetAdaptersInfo
CoInitialize
CoUninitialize
CoCreateGuid
UrlUnescapeA
PathFindExtensionA
URLDownloadToFileA
DeleteUrlCacheEntryA
InternetOpenA
InternetConnectA
HttpOpenRequestA
HttpSendRequestA
InternetReadFile
InternetCloseHandle
DllRegisterServer
ServiceHandler
ServiceMain
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ