ResetSSDT
ServiceMain
Static task
static1
Behavioral task
behavioral1
Sample
a128bdadb59f1fc96c82643a09665f19_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a128bdadb59f1fc96c82643a09665f19_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
a128bdadb59f1fc96c82643a09665f19_JaffaCakes118
Size
185KB
MD5
a128bdadb59f1fc96c82643a09665f19
SHA1
abada5c6692839631d4661fe49cbb3ff40cf676d
SHA256
1b8cb5a5d83cf5b4569cec2f895c21e2ea3c9fb71f2807fba95b341e5dfc1bdb
SHA512
ce1bc3ed2700ab507837d32d34e512c2d2abdc437263457e7df2b14360aeb307d9268443613e225ca9dd54456d75d91eca52bc5bc9bdacb64c949a76b341152b
SSDEEP
3072:7Gm9hmrNKRRCsRBuZKA4suyMXPbXgAZ4+2Q7glYe+34otUhUzvKhoPaLhPn:S7kRwAAKHsuBXPrgAm+2Qf4zSKSPKh
Checks for missing Authenticode signature.
resource |
---|
a128bdadb59f1fc96c82643a09665f19_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
CreateProcessA
GetTempPathA
MoveFileExA
GetTickCount
GetLocalTime
GetModuleHandleA
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalSize
InterlockedExchange
GetStartupInfoA
CreatePipe
DisconnectNamedPipe
TerminateProcess
PeekNamedPipe
WaitForMultipleObjects
SizeofResource
GetFileAttributesA
FindResourceA
DeviceIoControl
LoadLibraryExA
OpenEventA
SetErrorMode
SetUnhandledExceptionFilter
FreeConsole
LocalSize
OpenProcess
Process32Next
Process32First
CreateToolhelp32Snapshot
GetCurrentProcess
lstrcmpiA
MoveFileA
LocalFree
FindClose
GetLogicalDriveStringsA
GetSystemDirectoryA
GetLastError
SetLastError
LoadResource
WriteFile
SetFilePointer
DeleteCriticalSection
VirtualFree
LeaveCriticalSection
EnterCriticalSection
VirtualAlloc
CreateEventA
CloseHandle
TerminateThread
InitializeCriticalSection
lstrcpyA
ResetEvent
WaitForSingleObject
SetEvent
CancelIo
Sleep
lstrlenA
GetPrivateProfileSectionNamesA
lstrcatA
GetWindowsDirectoryA
FreeLibrary
GetProcAddress
LoadLibraryA
MultiByteToWideChar
WideCharToMultiByte
lstrcmpA
GetPrivateProfileStringA
GetVersionExA
DeleteFileA
GetDriveTypeA
GetDiskFreeSpaceExA
GetVolumeInformationA
ReadFile
CreateFileA
GetFileSize
RemoveDirectoryA
LocalAlloc
FindFirstFileA
LocalReAlloc
GetCurrentThreadId
FindNextFileA
CreateWindowExA
PostMessageA
GetThreadDesktop
GetUserObjectInformationA
OpenInputDesktop
SetThreadDesktop
CloseDesktop
EnumWindows
GetWindowThreadProcessId
CloseWindow
GetProcessWindowStation
OpenWindowStationA
SetProcessWindowStation
CloseWindowStation
GetCursorPos
ReleaseDC
GetDesktopWindow
GetDC
GetSystemMetrics
SetRect
GetClipboardData
ExitWindowsEx
IsWindow
IsWindowVisible
wsprintfA
GetWindowTextA
GetActiveWindow
GetKeyNameTextA
GetFocus
CallNextHookEx
OpenDesktopA
SetWindowsHookExA
UnhookWindowsHookEx
SendMessageA
SystemParametersInfoA
keybd_event
OpenClipboard
EmptyClipboard
SetClipboardData
CloseClipboard
mouse_event
SetCursorPos
WindowFromPoint
SetCapture
MapVirtualKeyA
DeleteDC
SelectObject
GetPaletteEntries
CreateHalftonePalette
BitBlt
DeleteObject
CreateCompatibleDC
CreateDIBSection
GetTokenInformation
LookupAccountSidA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
SetServiceStatus
RegisterServiceCtrlHandlerExA
StartServiceA
OpenEventLogA
ClearEventLogA
CloseEventLog
RegQueryValueA
RegOpenKeyExA
RegOpenKeyA
RegQueryValueExA
RegCreateKeyA
RegSetValueExA
RegCloseKey
OpenSCManagerA
OpenServiceA
QueryServiceStatus
ControlService
DeleteService
CloseServiceHandle
LsaFreeMemory
LsaOpenPolicy
LsaRetrievePrivateData
LsaClose
LookupAccountNameA
IsValidSid
SHGetFileInfoA
SHGetSpecialFolderPathA
SHDeleteKeyA
_except_handler3
strncpy
strrchr
realloc
atoi
wcstombs
_beginthreadex
malloc
free
??1type_info@@UAE@XZ
_initterm
_adjust_fdiv
strchr
_CxxThrowException
??2@YAPAXI@Z
__CxxFrameHandler
_strcmpi
strstr
_ftol
ceil
memmove
calloc
??3@YAXPAX@Z
gethostname
connect
getsockname
WSACleanup
WSAStartup
htons
gethostbyname
ntohs
recv
setsockopt
send
select
closesocket
socket
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?_Xran@std@@YAXXZ
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_Refcnt@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEAAEPBD@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
MakeSureDirectoryPathExists
ImmGetContext
ImmGetCompositionStringA
ImmReleaseContext
InternetOpenUrlA
InternetReadFile
InternetCloseHandle
InternetOpenA
URLDownloadToFileA
capGetDriverDescriptionA
capCreateCaptureWindowA
EnumProcessModules
GetModuleFileNameExA
WTSFreeMemory
WTSQuerySessionInformationA
ResetSSDT
ServiceMain
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ