CodeService
EndWork
Level
MainCode
MainService
Runing
ServiceCode
Static task
static1
Behavioral task
behavioral1
Sample
ade1def223af390fb2e20844cfa962a4_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ade1def223af390fb2e20844cfa962a4_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
ade1def223af390fb2e20844cfa962a4_JaffaCakes118
Size
110KB
MD5
ade1def223af390fb2e20844cfa962a4
SHA1
705b9821de92e303222eb47972bd4ea87dcf494b
SHA256
6aa8aeda719929caaeb0b798de58e6afea03a1f81fba99236f5fb30cfbe0d234
SHA512
929e333d3dabc780aa7e45b6d6a8893a42a94f0384c114f17052b4c5bea9e90e2be60eec81f6a9a7344f9f8d94fb309e3766c72faf2fd274e1ab1366a0249727
SSDEEP
1536:kyaZ/G+c6bs3RK2jZgM0mc30vfiIuvSA0FPkxy/8KAfHKom0:pnRKuOM0mY0XiIuKFPkxy9eqov
Checks for missing Authenticode signature.
resource |
---|
ade1def223af390fb2e20844cfa962a4_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetProcAddress
LoadLibraryA
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
CreateEventA
CloseHandle
WaitForSingleObject
ResetEvent
lstrcpyA
SetEvent
CancelIo
Sleep
DeleteFileA
GetLastError
CreateDirectoryA
GetFileAttributesA
lstrlenA
FreeLibrary
GetDriveTypeA
GetDiskFreeSpaceExA
GetVolumeInformationA
GetLogicalDriveStringsA
FindClose
LocalFree
FindNextFileA
LocalReAlloc
FindFirstFileA
LocalAlloc
GetFileSize
ReadFile
SetFilePointer
MoveFileA
lstrcatA
CreateProcessA
CreateThread
TerminateThread
InterlockedExchange
Process32Next
lstrcmpiA
Process32First
CreateToolhelp32Snapshot
GetTickCount
WriteFile
CreateFileA
GetLocalTime
HeapFree
GetProcessHeap
OutputDebugStringA
HeapAlloc
UnmapViewOfFile
GetModuleHandleA
VirtualFree
VirtualAlloc
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalSize
GetStartupInfoA
PeekNamedPipe
WaitForMultipleObjects
LocalSize
TerminateProcess
OpenProcess
GetCurrentThreadId
GlobalMemoryStatus
GetSystemInfo
GetComputerNameA
GetVersionExA
OpenEventA
SetErrorMode
GetCurrentProcess
GetWindowsDirectoryA
SetFileAttributesA
CopyFileA
ExpandEnvironmentStringsA
GetModuleFileNameA
RaiseException
memset
??2@YAPAXI@Z
memcmp
free
malloc
_except_handler3
strcmp
sprintf
strcpy
strrchr
puts
strcat
__CxxFrameHandler
_beginthreadex
atoi
wcstombs
rand
_access
srand
calloc
_initterm
_adjust_fdiv
strstr
strlen
_ftol
ceil
memmove
strncpy
memcpy
??3@YAXPAX@Z
_strrev
_stricmp
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
CodeService
EndWork
Level
MainCode
MainService
Runing
ServiceCode
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ