DoMainWork
DoService
ServiceMain
Static task
static1
Behavioral task
behavioral1
Sample
a05aecae815a5289a4fec2b749721e2b_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a05aecae815a5289a4fec2b749721e2b_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
a05aecae815a5289a4fec2b749721e2b_JaffaCakes118
Size
48KB
MD5
a05aecae815a5289a4fec2b749721e2b
SHA1
921ae5fefb5933f5efdf34ef4faba4047cfe1231
SHA256
04e93ef3a78904afba987924b090ffddb39b7e18fa7dbf43814c8f73da8e3466
SHA512
fd3f5242cc86271e6eadeb149ae0952ffc93184df6f1e0e143afdac4a461581362258a2fc9908c7eea0797be73f1658206fee715546998f2589f67cf404a56b0
SSDEEP
1536:0oq8Xkv6EtmKrIz6H7PZEHF2IyeLXt7JSDv8AXm82u:0oqsEtmEc6H7PZBdXm/u
Checks for missing Authenticode signature.
resource |
---|
a05aecae815a5289a4fec2b749721e2b_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PostMessageA
GetThreadDesktop
wsprintfA
CharUpperA
GetWindowTextA
GetWindowThreadProcessId
EnumWindows
UpdateWindow
BringWindowToTop
ShowWindow
DestroyWindow
DispatchMessageA
SendInput
GetMessageA
SendMessageA
IsWindow
UnhookWindowsHookEx
CallNextHookEx
SetWindowsHookExA
CreateDesktopA
SetProcessWindowStation
OpenWindowStationA
ToAscii
GetKeyboardState
OpenInputDesktop
SetThreadDesktop
SetCursorPos
OpenDesktopA
ExitWindowsEx
MessageBoxA
GetActiveWindow
GetFocus
GetCurrentObject
CreateDCA
DeleteDC
GetDeviceCaps
OpenThreadToken
LookupPrivilegeValueA
OpenProcessToken
ImpersonateSelf
ChangeServiceConfigA
RegCreateKeyExA
SetServiceStatus
RegisterServiceCtrlHandlerA
RegQueryValueExA
CreateServiceA
RegEnumValueA
RegEnumKeyExA
RegDeleteValueA
RegOpenKeyExA
RegSetValueExA
RegCloseKey
QueryServiceConfigA
EnumServicesStatusA
DeleteService
ControlService
StartServiceA
OpenSCManagerA
OpenServiceA
CloseServiceHandle
AdjustTokenPrivileges
SHFileOperationA
ShellExecuteA
SHEmptyRecycleBinA
CreateStreamOnHGlobal
WSAStartup
WSADuplicateSocketA
WSASocketA
htons
getsockname
send
inet_addr
accept
ntohs
listen
setsockopt
bind
socket
connect
gethostbyname
inet_ntoa
closesocket
recv
select
StrStrA
StrCmpNIA
StrToIntA
StrChrA
SHDeleteKeyA
StrRChrA
EnumProcesses
GetModuleFileNameExA
InternetOpenA
HttpQueryInfoA
InternetReadFile
InternetCloseHandle
InternetOpenUrlA
TransmitFile
ImmReleaseContext
ImmGetCompositionStringA
ImmGetContext
strcpy
_except_handler3
?terminate@@YAXXZ
_initterm
_adjust_fdiv
strstr
strchr
malloc
wcscmp
free
memcpy
abs
_beginthread
__CxxFrameHandler
memset
??2@YAPAXI@Z
??3@YAXPAX@Z
capGetDriverDescriptionA
capCreateCaptureWindowA
SetPriorityClass
GetThreadPriority
GetCurrentThread
GetPriorityClass
SetFilePointer
FlushFileBuffers
DisconnectNamedPipe
ConnectNamedPipe
CreateNamedPipeA
lstrcatA
OpenEventA
CallNamedPipeA
GetStartupInfoA
GetModuleFileNameA
GetSystemDirectoryA
IsDBCSLeadByte
GetLocalTime
ExitProcess
GetFileAttributesA
WaitForMultipleObjects
CreateThread
GetProcAddress
FreeLibrary
LocalAlloc
InterlockedExchange
RaiseException
GetVersionExA
GetSystemInfo
GlobalMemoryStatus
GetComputerNameA
GetACP
GetOEMCP
SetThreadPriority
CreateProcessA
GetStdHandle
CreatePipe
SetStdHandle
DuplicateHandle
GlobalLock
GlobalUnlock
GlobalAlloc
GlobalFree
OpenProcess
TerminateProcess
CreateToolhelp32Snapshot
Process32First
Process32Next
GetCurrentProcess
GetCurrentProcessId
lstrcmpiA
FindFirstFileA
lstrcmpA
FindNextFileA
GetLastError
FindClose
GetFileAttributesExA
GetLogicalDriveStringsA
GetDiskFreeSpaceExA
GetVolumeInformationA
GetDriveTypeA
lstrcpyA
MoveFileA
CreateDirectoryA
WriteFile
GetTempPathA
lstrlenA
SetEvent
WaitForSingleObject
GetFileSize
DeleteFileA
GetVersion
QueryPerformanceCounter
DeviceIoControl
CreateEventA
GetCurrentThreadId
Sleep
CreateFileA
GetFileSizeEx
SetFilePointerEx
ReadFile
CloseHandle
GetTickCount
LoadLibraryA
QueryPerformanceFrequency
DoMainWork
DoService
ServiceMain
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ