EndWork
Runing
Working
fuckabc
Static task
static1
Behavioral task
behavioral1
Sample
c0ede9e90f07bfc5b766adc9c2f3e30d_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c0ede9e90f07bfc5b766adc9c2f3e30d_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
c0ede9e90f07bfc5b766adc9c2f3e30d_JaffaCakes118
Size
207KB
MD5
c0ede9e90f07bfc5b766adc9c2f3e30d
SHA1
a16c1b8b03ebb79581690cf5052e02978b25d1a2
SHA256
94bda6ed99f70e37d7bcc54d60d4b8c8b36de01c95bb58da8f8a9ad4996c1f26
SHA512
81e5ae3873cf5bdd65345467054f23bc6e60a0612a5db702de49cc3fc772d1c5bbfa92a01b54fd4ca1c1baa89af9dc1a09680431fbb380d747824214879fd967
SSDEEP
6144:80d2VBqXnkK3LAUgwN4fOVM10UbFaxU+kX7mfOVf:JseXh3Ln6mVM10UYc6mVf
Checks for missing Authenticode signature.
resource |
---|
c0ede9e90f07bfc5b766adc9c2f3e30d_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetLogicalDriveStringsA
FindClose
LocalFree
GetFileSize
ReadFile
MoveFileA
lstrcmpiA
MapViewOfFile
CreateFileMappingA
HeapFree
UnmapViewOfFile
GetModuleHandleA
GetVolumeInformationA
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalSize
GetStartupInfoA
WaitForMultipleObjects
TerminateProcess
GetVersionExA
OpenEventA
GetCurrentProcess
Process32Next
GetDiskFreeSpaceExA
GetDriveTypeA
lstrlenA
lstrcpyA
GetFileAttributesA
CreateDirectoryA
HeapAlloc
GetTickCount
CancelIo
InterlockedExchange
ResetEvent
GetLastError
VirtualAlloc
EnterCriticalSection
VirtualFree
DeleteCriticalSection
ResumeThread
Sleep
TerminateThread
CloseHandle
FreeLibrary
GetProcAddress
LoadLibraryA
GlobalFree
DispatchMessageA
TranslateMessage
GetMessageA
CharNextA
wsprintfA
GetWindowTextA
MessageBoxA
LoadCursorA
SendMessageA
MapVirtualKeyA
SetCapture
WindowFromPoint
SetCursorPos
mouse_event
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
GetSystemMetrics
SetRect
GetDesktopWindow
ReleaseDC
GetUserObjectInformationA
IsWindowVisible
PostMessageA
IsWindow
CreateWindowExA
LoadMenuA
GetWindowThreadProcessId
DestroyCursor
GetStockObject
RegCloseKey
RegRestoreKeyA
RegQueryValueExA
RegOpenKeyExA
CloseEventLog
ClearEventLogA
OpenEventLogA
RegSetValueExA
CloseServiceHandle
DeleteService
SetSecurityDescriptorDacl
AddAccessAllowedAce
InitializeAcl
GetLengthSid
AllocateAndInitializeSid
RegOpenKeyA
UnlockServiceDatabase
ChangeServiceConfig2A
LockServiceDatabase
StartServiceA
RegSaveKeyA
strcpy
_strrev
_adjust_fdiv
_initterm
??1type_info@@UAE@XZ
calloc
srand
_access
wcstombs
atoi
_beginthreadex
strrchr
strcat
strcmp
_except_handler3
malloc
free
strncpy
sprintf
_stricmp
rand
memset
??2@YAPAXI@Z
??3@YAXPAX@Z
puts
memcpy
__CxxFrameHandler
memmove
putchar
ceil
_ftol
strlen
strstr
memcmp
_CxxThrowException
send
inet_addr
connect
sendto
htonl
getsockname
closesocket
select
recv
socket
gethostbyname
htons
setsockopt
WSAStartup
WSACleanup
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
EndWork
Runing
Working
fuckabc
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ