COMResModuleInstance
DriverProc
KsCreateAllocator
KsCreatePin
KsCreateTopologyNode
ServerMain
modMessage
modmCallback
Static task
static1
Behavioral task
behavioral1
Sample
a68eea5e7810b833659814bc47012e91_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a68eea5e7810b833659814bc47012e91_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
a68eea5e7810b833659814bc47012e91_JaffaCakes118
Size
30KB
MD5
a68eea5e7810b833659814bc47012e91
SHA1
431d81f355bbc8d731917c99c6647b22b38b1ebd
SHA256
93424c1691d2c49753bd67fc309aa797384e02a4bf3cbd39fec1b25e816b99ac
SHA512
83ecd4b5cf2664ae410e8ebcf4df2b79ac702b89d52667772e4ce09be5dbe8fa207bebbfe6e50f3c7c3ef0aed35dfcb5fd17e7890c80e03b54cace7fd91d59c8
SSDEEP
768:9YqhbJptTphHr271mcY736vY9lwhhZLpox:9YQbJfphK71g7qme/ng
Checks for missing Authenticode signature.
resource |
---|
a68eea5e7810b833659814bc47012e91_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetFileSize
FreeLibrary
SetFilePointer
GetLastError
CreateEventA
GetModuleFileNameA
GetTempPathA
GetWindowsDirectoryA
Process32Next
Process32First
ReadFile
MoveFileExA
GetTempFileNameA
GetFileAttributesA
TerminateProcess
OpenProcess
SetFileAttributesA
CopyFileA
GetCommandLineA
ExitProcess
WaitForSingleObject
CreateThread
Sleep
GetSystemDirectoryA
MultiByteToWideChar
DeleteFileA
GlobalLock
CreateFileA
WriteFile
GlobalUnlock
GlobalFree
CloseHandle
LoadLibraryA
GetProcAddress
GetModuleHandleA
GlobalAlloc
CreateToolhelp32Snapshot
VirtualProtect
SetWindowLongA
RegisterShellHookWindow
RegisterWindowMessageA
EnumWindows
GetClassNameA
wsprintfA
GetClientRect
GetDesktopWindow
GetDC
GetWindowRect
GetParent
GetWindowThreadProcessId
ReleaseDC
GetWindowTextA
CallWindowProcA
CreateDCA
GetDeviceCaps
DeleteObject
BitBlt
SelectObject
CreateCompatibleBitmap
CreateCompatibleDC
GetDIBits
RealizePalette
SelectPalette
GetStockObject
GetObjectA
DeleteDC
GdiplusShutdown
GdipDisposeImage
GdipLoadImageFromFile
GdipGetImageEncoders
GdipGetImageEncodersSize
GdipFree
GdipAlloc
GdipCloneImage
GdiplusStartup
GdipSaveImageToFile
??0_Lockit@std@@QAE@XZ
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??0Init@ios_base@std@@QAE@XZ
??1Init@ios_base@std@@QAE@XZ
??0_Winit@std@@QAE@XZ
??1_Winit@std@@QAE@XZ
??1_Lockit@std@@QAE@XZ
connect
htons
gethostbyname
socket
recv
inet_ntoa
WSAStartup
send
WSACleanup
inet_addr
closesocket
GetModuleFileNameExA
InternetReadFile
InternetOpenUrlA
InternetOpenA
InternetCloseHandle
strrchr
_access
strcat
memset
strchr
atoi
strncpy
strcmp
__dllonexit
_onexit
_initterm
_adjust_fdiv
_stricmp
_strlwr
_getpid
_strrev
free
strstr
abs
sprintf
malloc
wcscmp
strcpy
strlen
??2@YAPAXI@Z
memcpy
__CxxFrameHandler
Netbios
COMResModuleInstance
DriverProc
KsCreateAllocator
KsCreatePin
KsCreateTopologyNode
ServerMain
modMessage
modmCallback
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ