ExportFunc
ExportFunc2
ServiceMain
Static task
static1
Behavioral task
behavioral1
Sample
af88901b16cce3bb09e144f14c130792_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
af88901b16cce3bb09e144f14c130792_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
af88901b16cce3bb09e144f14c130792_JaffaCakes118
Size
216KB
MD5
af88901b16cce3bb09e144f14c130792
SHA1
ca4aefa49b314dd63e50113ac999b0bc1b3f453e
SHA256
2b56e46059173544e7c2874700de695d84600bf915eb75c0994de2ae866b4ba1
SHA512
d7c62db9bac8fabb57d7c71032ed15e6d990c2cb66ab41375a94165b43a748023c2544fe009ea21565f0567ab4bc77328aa452219aee69a1467b98c13ce6d739
SSDEEP
3072:h2M1RYl/eu2KAT5ERquWtOzmhLFnvKnhWzU03li9X0E:h2MrPWe9ozIN3lq0
Checks for missing Authenticode signature.
resource |
---|
af88901b16cce3bb09e144f14c130792_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
CreateFileA
GetProcAddress
LoadLibraryA
FreeLibrary
LocalFree
MapViewOfFile
UnmapViewOfFile
ExitProcess
WideCharToMultiByte
lstrlenW
MultiByteToWideChar
MoveFileExA
lstrlenA
VirtualFreeEx
CreateRemoteThread
WriteProcessMemory
VirtualAllocEx
OpenProcess
GetCurrentProcess
InterlockedDecrement
SystemTimeToFileTime
FindNextFileA
HeapCreate
HeapDestroy
GetEnvironmentStringsW
SetEnvironmentVariableA
CompareStringW
CompareStringA
SetEndOfFile
FlushFileBuffers
SetStdHandle
GetStringTypeW
GetStringTypeA
SetFileTime
FindFirstFileA
FindClose
DeleteFileA
CopyFileA
GetSystemDirectoryA
GetWindowsDirectoryA
GetTempPathA
GetCurrentThreadId
GetLastError
GetTickCount
InterlockedExchange
FreeConsole
GetExitCodeThread
TerminateThread
DisableThreadLibraryCalls
Sleep
SetLastError
GetModuleFileNameA
ReleaseMutex
CreateMutexA
WaitForSingleObject
CloseHandle
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
FreeEnvironmentStringsW
InitializeCriticalSection
IsBadCodePtr
GetCPInfo
GetOEMCP
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
UnhandledExceptionFilter
IsBadWritePtr
GetTimeZoneInformation
SetFilePointer
ReadFile
LCMapStringW
LCMapStringA
HeapSize
HeapReAlloc
GetCurrentProcessId
QueryPerformanceCounter
WriteFile
GetSystemTimeAsFileTime
RtlUnwind
RaiseException
ExitThread
CreateThread
GetCommandLineA
IsBadReadPtr
GetModuleHandleA
TerminateProcess
GetFileAttributesA
HeapAlloc
HeapFree
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
TlsAlloc
TlsFree
TlsSetValue
TlsGetValue
SetUnhandledExceptionFilter
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
VirtualFree
TranslateMessage
DispatchMessageA
GetMessageA
SetWindowTextA
SetTimer
PostMessageA
MessageBoxA
FindWindowA
SetWindowPos
SystemParametersInfoA
EnumChildWindows
GetWindowThreadProcessId
PostThreadMessageA
KillTimer
EnumWindows
GetClassNameA
RegisterServiceCtrlHandlerA
RegEnumKeyA
RegEnumValueA
RegQueryInfoKeyA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
GetSecurityInfo
SetEntriesInAclA
SetSecurityInfo
RegCreateKeyExA
ControlService
QueryServiceStatus
SetServiceStatus
OpenServiceA
DeleteService
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
RegCloseKey
OpenSCManagerA
CreateServiceA
CloseServiceHandle
RegCreateKeyA
ShellExecuteA
SHGetFolderPathA
CoCreateInstance
CoCreateGuid
CoInitializeEx
SysFreeString
SysAllocString
VariantClear
GetErrorInfo
VariantInit
Netbios
InternetReadFile
HttpQueryInfoA
InternetOpenUrlA
InternetSetOptionA
InternetOpenA
InternetCloseHandle
GetProfilesDirectoryA
CreateURLMoniker
ExportFunc
ExportFunc2
ServiceMain
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ