EndWork
Runing
Working
fuckabc
Static task
static1
Behavioral task
behavioral1
Sample
c1a189314a675c91230c2347d148d659_JaffaCakes118.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
c1a189314a675c91230c2347d148d659_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
c1a189314a675c91230c2347d148d659_JaffaCakes118
Size
112KB
MD5
c1a189314a675c91230c2347d148d659
SHA1
4224e6ce35f8c53487b2b2759ac684d1583c5266
SHA256
95fba7fa4aeae9dc4009484771c8ec25ddea95ca042c59ce4b5b1c22f455f529
SHA512
7d30814db1008e5d25a7a9f73fcc798df2a9ce51ec78b1b8916757f15fe0fca8d541cfde1013bb43652c6bcbe666d94857711b9bd9d4e3d0fc508075048a9e16
SSDEEP
3072:sSU1MnbWb8o2HjYx9Shca6o7UYUgwhBp37VX1:LSMbWbkEx4hH6onUgwhH7
Checks for missing Authenticode signature.
resource |
---|
c1a189314a675c91230c2347d148d659_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
FindClose
LocalFree
GetFileSize
ReadFile
MoveFileA
lstrcmpiA
MapViewOfFile
CreateFileMappingA
HeapFree
UnmapViewOfFile
GetModuleHandleA
GlobalFree
GetLogicalDriveStringsA
GlobalLock
GlobalAlloc
GlobalSize
GetStartupInfoA
WaitForMultipleObjects
TerminateProcess
GetVersionExA
OpenEventA
GetCurrentProcess
Process32Next
GetVolumeInformationA
GetDiskFreeSpaceExA
GetDriveTypeA
lstrlenA
lstrcpyA
GetFileAttributesA
CreateDirectoryA
HeapAlloc
GetTickCount
CancelIo
ResetEvent
GetLastError
VirtualAlloc
EnterCriticalSection
VirtualFree
DeleteCriticalSection
ResumeThread
Sleep
TerminateThread
CloseHandle
GetProcAddress
FreeLibrary
LoadLibraryA
GlobalUnlock
DispatchMessageA
TranslateMessage
GetMessageA
CharNextA
wsprintfA
GetWindowTextA
MessageBoxA
LoadCursorA
SendMessageA
MapVirtualKeyA
SetCapture
WindowFromPoint
SetCursorPos
mouse_event
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
GetSystemMetrics
SetRect
GetDesktopWindow
ReleaseDC
GetUserObjectInformationA
IsWindowVisible
PostMessageA
IsWindow
CreateWindowExA
LoadMenuA
GetWindowThreadProcessId
DestroyCursor
GetStockObject
RegQueryValueExA
RegRestoreKeyA
RegCloseKey
RegOpenKeyExA
CloseEventLog
ClearEventLogA
OpenEventLogA
RegSetValueExA
CloseServiceHandle
DeleteService
SetSecurityDescriptorDacl
AddAccessAllowedAce
InitializeAcl
GetLengthSid
AllocateAndInitializeSid
RegOpenKeyA
UnlockServiceDatabase
ChangeServiceConfig2A
LockServiceDatabase
StartServiceA
RegSaveKeyA
strcpy
_strrev
_adjust_fdiv
_initterm
??1type_info@@UAE@XZ
calloc
srand
_access
wcstombs
atoi
_beginthreadex
strrchr
strcat
strcmp
_except_handler3
malloc
free
strncpy
sprintf
_stricmp
rand
memset
??2@YAPAXI@Z
??3@YAXPAX@Z
puts
memcpy
__CxxFrameHandler
memmove
putchar
ceil
_ftol
strlen
strstr
memcmp
_CxxThrowException
send
inet_addr
connect
sendto
htonl
getsockname
closesocket
select
recv
socket
gethostbyname
htons
setsockopt
WSAStartup
WSACleanup
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
EndWork
Runing
Working
fuckabc
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ