ServiceMain
xxxx
xxxx1
yyyy
Static task
static1
Behavioral task
behavioral1
Sample
a403ed8a35da9d7ff8721bc54784b258_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a403ed8a35da9d7ff8721bc54784b258_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
a403ed8a35da9d7ff8721bc54784b258_JaffaCakes118
Size
82KB
MD5
a403ed8a35da9d7ff8721bc54784b258
SHA1
266f71857e38b19a8c96fe8b99907e485608ab3d
SHA256
d287124ab4cf1fd58859660132c6d5d72039047408ee1ba2a0bdc2d5087680d8
SHA512
58333b936db1d4a0c6441c94a34eebe7bf8e3e71fb9f7439153e8ab7af18bb1dcb50aa73ae12e3de5a6cbd30cad74f10d9ff629d26b8040c7a8c4e6dd353d16d
SSDEEP
1536:8ItPZw+Nbb6Fg8v1aqP+eJovxxmlGEYncX+4fhjKp1IS4I7Fk/21LWkj:8Efbb6Fl1aSLJ3Ync+ihjKpaSf7Fk/2b
Checks for missing Authenticode signature.
resource |
---|
a403ed8a35da9d7ff8721bc54784b258_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetProcessHeap
HeapAlloc
UnmapViewOfFile
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalSize
GetStartupInfoA
CreatePipe
DisconnectNamedPipe
TerminateProcess
PeekNamedPipe
GetTickCount
HeapFree
OpenEventA
SetErrorMode
CreateMutexA
SetUnhandledExceptionFilter
FreeConsole
LocalSize
Process32Next
Process32First
lstrcmpiA
GetCurrentThreadId
MoveFileExA
TerminateThread
OpenProcess
CreateFileMappingA
MapViewOfFile
ReleaseMutex
GetLocalTime
VirtualAllocEx
WriteProcessMemory
GetCurrentProcess
GetSystemDirectoryA
SetLastError
GetModuleFileNameA
MoveFileA
WriteFile
SetFilePointer
ReadFile
CreateFileA
GetFileSize
RemoveDirectoryA
LocalAlloc
FindFirstFileA
LocalReAlloc
FindNextFileA
LocalFree
FindClose
GetLogicalDriveStringsA
GetVolumeInformationA
GetDiskFreeSpaceExA
GetDriveTypeA
CreateProcessA
GetFileAttributesA
CreateDirectoryA
GetLastError
DeleteFileA
GetVersionExA
GetPrivateProfileStringA
lstrcmpA
WideCharToMultiByte
MultiByteToWideChar
FreeLibrary
GetWindowsDirectoryA
lstrcatA
GetPrivateProfileSectionNamesA
lstrlenA
Sleep
InterlockedExchange
SetEvent
lstrcpyA
ResetEvent
WaitForSingleObject
CloseHandle
InitializeCriticalSection
CreateEventA
LoadLibraryA
GetProcAddress
VirtualAlloc
EnterCriticalSection
LeaveCriticalSection
VirtualFree
DeleteCriticalSection
WaitForMultipleObjects
SetRect
GetSystemMetrics
GetClipboardData
OpenClipboard
EmptyClipboard
SetClipboardData
CloseClipboard
mouse_event
GetDC
SetProcessWindowStation
ExitWindowsEx
MapVirtualKeyA
keybd_event
SystemParametersInfoA
SendMessageA
BlockInput
DestroyCursor
LoadCursorA
GetDesktopWindow
ReleaseDC
GetCursorPos
SetCursorPos
GetCursorInfo
OpenDesktopA
PostMessageA
OpenWindowStationA
WindowFromPoint
GetProcessWindowStation
GetWindowThreadProcessId
wsprintfA
IsWindowVisible
EnumWindows
CloseDesktop
SetThreadDesktop
OpenInputDesktop
GetThreadDesktop
GetUserObjectInformationA
CharNextA
GetWindowTextA
CreateWindowExA
CloseWindow
IsWindow
SetCapture
UnhookWindowsHookEx
SetWindowsHookExA
GetActiveWindow
GetKeyNameTextA
BitBlt
CreateCompatibleDC
CreateCompatibleBitmap
CreateDIBSection
GetDIBits
DeleteObject
SelectObject
DeleteDC
LsaOpenPolicy
LsaRetrievePrivateData
LsaClose
LookupAccountNameA
IsValidSid
GetTokenInformation
LookupAccountSidA
SetServiceStatus
RegisterServiceCtrlHandlerA
RegDeleteValueA
RegDeleteKeyA
RegCreateKeyExA
LsaFreeMemory
RegCloseKey
RegQueryValueA
RegOpenKeyExA
DeleteService
ControlService
QueryServiceStatus
OpenServiceA
OpenSCManagerA
RegSetValueExA
RegCreateKeyA
RegQueryValueExA
RegOpenKeyA
CloseEventLog
ClearEventLogA
OpenEventLogA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
FreeSid
SetSecurityDescriptorDacl
AddAccessAllowedAce
InitializeAcl
GetLengthSid
AllocateAndInitializeSid
InitializeSecurityDescriptor
RegEnumKeyExA
RegEnumValueA
SHGetFileInfoA
SHGetSpecialFolderPathA
SHDeleteKeyA
?terminate@@YAXXZ
_adjust_fdiv
_initterm
??1type_info@@UAE@XZ
calloc
_beginthreadex
wcstombs
atoi
realloc
strncat
strncpy
strrchr
_except_handler3
free
strcmp
strcpy
malloc
strchr
_CxxThrowException
memcmp
??2@YAPAXI@Z
memset
__CxxFrameHandler
strlen
_ftol
ceil
memmove
memcpy
??3@YAXPAX@Z
strcat
_strnicmp
_strcmpi
getsockname
gethostname
WSAStartup
WSACleanup
WSAIoctl
setsockopt
connect
htons
gethostbyname
socket
closesocket
ntohs
recv
select
send
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
ImmReleaseContext
ImmGetContext
ImmGetCompositionStringA
InternetReadFile
InternetOpenUrlA
InternetOpenA
InternetCloseHandle
capGetDriverDescriptionA
capCreateCaptureWindowA
ICSeqCompressFrame
ICSendMessage
ICOpen
ICClose
ICCompressorFree
ICSeqCompressFrameEnd
ICSeqCompressFrameStart
GetModuleFileNameExA
EnumProcessModules
WTSQuerySessionInformationA
WTSFreeMemory
ServiceMain
xxxx
xxxx1
yyyy
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ