UnHook
WSPStartup
installhook
Static task
static1
Behavioral task
behavioral1
Sample
b9eebfbfb68555516cf422a66d27e900_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b9eebfbfb68555516cf422a66d27e900_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
b9eebfbfb68555516cf422a66d27e900_JaffaCakes118
Size
124KB
MD5
b9eebfbfb68555516cf422a66d27e900
SHA1
fc0c6d5e7bdafeeb00a02dd6fde904f822595d00
SHA256
9941bb93d7f079d3b1c1efd3df2d2af6f2978dd910c910e71cef676982523adf
SHA512
08c1c72de505c6618dce3d0a8179701978d21318d3a2d8819d187230c0d6abed6c9a84dba9178fadcec026fb5d130b4114253a247356ede8c30ab0da2a50e86d
SSDEEP
3072:0DqYD/u4OS3eZCAwqrjoaOn08Z00lYhg:0DqYD/u4OjwqgRn0M6K
Checks for missing Authenticode signature.
resource |
---|
b9eebfbfb68555516cf422a66d27e900_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetFileSize
CreateFileA
MoveFileA
SetFileTime
GetFileTime
GetFileAttributesA
SetFileAttributesA
CopyFileA
OutputDebugStringA
WriteFile
GetEnvironmentVariableA
ReadFile
SetFilePointer
GetProcAddress
GetLocalTime
TerminateThread
GlobalFree
GlobalUnlock
GlobalHandle
GlobalLock
GlobalAlloc
GetModuleFileNameA
WaitForSingleObject
GetLastError
CreateMutexA
GetSystemDirectoryA
LockResource
SizeofResource
LoadResource
FindResourceA
GetVersion
GetPrivateProfileStringA
WritePrivateProfileStringA
CreateDirectoryA
CreateProcessA
GetStartupInfoA
DeleteFileA
MoveFileExA
FreeLibrary
LoadLibraryA
SystemTimeToFileTime
CloseHandle
GetTempPathA
GetVolumeInformationA
ReleaseMutex
ExpandEnvironmentStringsW
lstrcpyA
CompareStringW
CompareStringA
SetEndOfFile
GetCurrentDirectoryA
SetCurrentDirectoryA
FileTimeToLocalFileTime
FileTimeToSystemTime
FindNextFileA
GetWindowsDirectoryA
FindFirstFileA
FindClose
GetComputerNameA
GetVersionExA
lstrcmpiA
GetLogicalDrives
GetDriveTypeA
IsBadCodePtr
IsBadReadPtr
SetEnvironmentVariableA
SetUnhandledExceptionFilter
GetStringTypeW
GetStringTypeA
FlushFileBuffers
SetStdHandle
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetFileType
GetStdHandle
SetHandleCount
LCMapStringW
LCMapStringA
GetOEMCP
GetCPInfo
GetFullPathNameA
HeapSize
GetCurrentProcess
TerminateProcess
TlsGetValue
GetDiskFreeSpaceExA
GetACP
CreateThread
GetTempFileNameA
Sleep
GetTimeZoneInformation
GetSystemTime
HeapAlloc
HeapFree
RtlUnwind
InterlockedDecrement
InterlockedIncrement
MultiByteToWideChar
WideCharToMultiByte
GetCommandLineA
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
GetModuleHandleA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
IsBadWritePtr
DeleteCriticalSection
ExitProcess
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
SetLastError
ToAscii
GetKeyboardState
UnhookWindowsHookEx
GetForegroundWindow
GetKeyboardLayout
GetWindowTextA
CallNextHookEx
wsprintfA
SetWindowsHookExA
ControlService
RegQueryValueExA
RegOpenKeyExA
GetUserNameA
OpenSCManagerA
OpenServiceA
ChangeServiceConfigA
RegCloseKey
CreateServiceA
StartServiceA
CloseServiceHandle
RegEnumKeyExA
ShellExecuteA
recv
select
send
inet_addr
connect
WSACleanup
closesocket
htonl
htons
socket
WSAStartup
getsockname
inet_ntoa
ntohl
WSCEnumProtocols
gethostbyname
WSCDeinstallProvider
WSCWriteProviderOrder
WSCInstallProvider
WSCGetProviderPath
shutdown
ImmReleaseContext
ImmGetCompositionStringA
ImmGetDescriptionA
ImmGetContext
UnHook
WSPStartup
installhook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ