Install
NtCloseStatus
NtOpenStatus
RunInstallA
RunUninstallA
ServiceMain
Uninstall
Static task
static1
Behavioral task
behavioral1
Sample
a6fa26a6a92ce5d4450d9177dd96e1d6_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a6fa26a6a92ce5d4450d9177dd96e1d6_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
a6fa26a6a92ce5d4450d9177dd96e1d6_JaffaCakes118
Size
48KB
MD5
a6fa26a6a92ce5d4450d9177dd96e1d6
SHA1
aedb442f2f80e71041e7671785f62eea70619794
SHA256
d365e49ad1211d54a224ae580afe83d2c332c8b90c2a200af43e12cfcfffa2df
SHA512
c08b5a73ef889e909f3933b8bfcf95047ffa9232bbb5770883e78d74144dfe49d8f1ab85499552793db213e4725a0adf6a51d23cee7d83c7da81e533ee02bf0c
SSDEEP
768:4xd2iTF1tpDf060nkBLQVtcRxLhKPivXvstqNnOFDb/Jz9CYD+UGxceU0x:r81bf0dnIL8tcRxLKlCYD+UGxA0x
Checks for missing Authenticode signature.
resource |
---|
a6fa26a6a92ce5d4450d9177dd96e1d6_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
_CxxThrowException
_adjust_fdiv
_initterm
_onexit
__dllonexit
_except_handler3
_wcsupr
wcsrchr
wcschr
wcsstr
malloc
free
memmove
memcpy
_snwprintf
??2@YAPAXI@Z
rand
swprintf
__CxxFrameHandler
sprintf
strstr
memset
??3@YAXPAX@Z
??1type_info@@UAE@XZ
InternetOpenW
InternetConnectW
InternetSetOptionW
HttpOpenRequestW
HttpQueryInfoW
HttpSendRequestExW
InternetCloseHandle
InternetGetConnectedState
InternetReadFile
HttpEndRequestW
NetUserGetInfo
NetApiBufferFree
WSACleanup
WSAStartup
inet_ntoa
gethostbyname
CryptUnprotectData
ord3806
ord551
ord547
CopyFileW
TerminateThread
ExitThread
WinExec
GetModuleFileNameW
CreateThread
SetEvent
OpenEventW
GetCurrentProcessId
SetLastError
LocalFree
GetShortPathNameW
GetProcessHeap
HeapAlloc
HeapFree
WaitForSingleObject
lstrcpyW
GetVersionExW
lstrcpyA
lstrcmpA
lstrlenA
GetProcAddress
LoadLibraryW
FreeLibrary
lstrlenW
MultiByteToWideChar
GetLastError
GlobalMemoryStatus
lstrcatW
WideCharToMultiByte
GetComputerNameW
lstrcmpiA
lstrcmpiW
GetDiskFreeSpaceExW
GetDriveTypeW
FindClose
FindNextFileW
FileTimeToSystemTime
FileTimeToLocalFileTime
FindFirstFileW
GetVolumeInformationW
CloseHandle
WriteFile
SetFilePointer
CreateFileW
CreateDirectoryW
MoveFileW
DeleteFileW
ReadFile
GetFileSize
GetTempFileNameW
GetTempPathW
CreateProcessW
GetSystemDirectoryW
CreateToolhelp32Snapshot
PeekNamedPipe
Sleep
OpenProcess
Process32NextW
lstrcmpW
Process32FirstW
GetStartupInfoW
GetProcessWindowStation
SetUserObjectSecurity
GetUserObjectSecurity
OpenWindowStationW
CallNextHookEx
SetWindowsHookExW
SetProcessWindowStation
OpenDesktopW
CloseWindowStation
UnhookWindowsHookEx
CloseDesktop
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
RegCreateKeyExW
GetUserNameW
OpenProcessToken
CreateProcessAsUserW
SetSecurityDescriptorDacl
CopySid
AddAce
GetAce
CreateServiceW
InitializeAcl
GetLengthSid
GetAclInformation
GetSecurityDescriptorDacl
InitializeSecurityDescriptor
AddAccessAllowedAce
GetTokenInformation
RegSetValueExW
RegCreateKeyW
ChangeServiceConfigW
OpenSCManagerW
OpenServiceW
SetServiceStatus
RegisterServiceCtrlHandlerW
StartServiceW
CloseServiceHandle
GetNetworkParams
SHFileOperationW
SHGetFolderPathW
ShellExecuteW
CoCreateGuid
CoInitialize
CoUninitialize
GetErrorInfo
Install
NtCloseStatus
NtOpenStatus
RunInstallA
RunUninstallA
ServiceMain
Uninstall
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ