LoadProfile
ServiceMain
TestFunc
Static task
static1
Behavioral task
behavioral1
Sample
c24b80288e9d97bf1ecadb2b90ad1082_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c24b80288e9d97bf1ecadb2b90ad1082_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
c24b80288e9d97bf1ecadb2b90ad1082_JaffaCakes118
Size
58KB
MD5
c24b80288e9d97bf1ecadb2b90ad1082
SHA1
b5c8c4aafcfdaf5c1f0afc4b92e2df921e448946
SHA256
9799416256225113e5f367629227e26defc83ce77b5d76eedfa9a972e291566c
SHA512
aa48ec69e342d628e274d0552e3367665a20de14fd90005230881d06a17a9a0134485064a8cbbe770251dd93a7efd341df69c40df363bfb62015cdd72a3f13d1
SSDEEP
1536:We6Q1wjsCSGphJzPZW2pBG2Bv6Ul6hesCfPQlO5Bc:WeNqjsCSGphJNJ1IU86fPPBc
Checks for missing Authenticode signature.
resource |
---|
c24b80288e9d97bf1ecadb2b90ad1082_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
InternetOpenUrlA
InternetCloseHandle
HttpQueryInfoA
InternetReadFile
InternetOpenA
recv
setsockopt
send
connect
socket
htons
inet_ntoa
gethostbyname
inet_addr
WSAStartup
closesocket
GetModuleFileNameExA
GdiplusStartup
GdipGetImageEncodersSize
GdipGetImageEncoders
GdipDeleteGraphics
GdipCreateBitmapFromGdiDib
GdipGetImageGraphicsContext
GdipDrawImageI
GdipCreateBitmapFromHBITMAP
GdipAlloc
GdipCloneImage
GdipFree
GdipDisposeImage
GdipSaveImageToStream
GdipBitmapUnlockBits
GdipBitmapLockBits
GdipCloneBitmapAreaI
GdipCreateBitmapFromScan0
ord2985
ord3081
ord2976
ord3830
ord3831
ord3825
ord3079
ord4080
ord4622
ord4424
ord3738
ord561
ord815
ord3262
ord3136
ord4465
ord3147
ord2982
ord5714
ord5289
ord5307
ord4698
ord4079
ord2725
ord5302
ord5300
ord3346
ord2396
ord5199
ord1089
ord3922
ord5731
ord2512
ord2554
ord4486
ord6375
ord4274
ord3178
ord3010
ord3790
ord356
ord2770
ord1980
ord2781
ord1116
ord4058
ord3181
ord800
ord3319
ord3310
ord668
ord6385
ord5773
ord354
ord5186
ord3318
ord5442
ord1979
ord665
ord823
ord825
ord269
ord826
ord600
ord1578
ord6467
ord1255
ord1253
ord1570
ord1197
ord1243
ord342
ord1182
ord1577
ord1168
ord1575
ord1176
ord3259
??1type_info@@UAE@XZ
_adjust_fdiv
_initterm
_onexit
__dllonexit
?terminate@@YAXXZ
_except_handler3
atoi
fseek
fread
fopen
fwrite
fclose
getenv
strlen
memcmp
malloc
wcscmp
free
memset
__CxxFrameHandler
_beginthread
abs
memcpy
strchr
strrchr
strcmp
strcpy
sprintf
GlobalAlloc
GlobalUnlock
GlobalLock
ReadFile
GetOEMCP
WriteFile
DuplicateHandle
Process32Next
OpenProcess
lstrcatA
GetVolumeInformationA
SetStdHandle
GetDriveTypeA
GetDiskFreeSpaceExA
MoveFileA
CreateDirectoryA
SetEvent
WaitForSingleObject
DeleteFileA
CloseHandle
CreateEventA
GlobalFree
lstrcpyA
GetTickCount
GetLastError
GetSystemDirectoryA
GetCurrentProcessId
GetLocalTime
GetComputerNameA
GlobalMemoryStatus
GetSystemInfo
GetVersionExA
GetVersion
QueryPerformanceCounter
QueryPerformanceFrequency
SetThreadPriority
SetPriorityClass
GetThreadPriority
GetCurrentThread
GetPriorityClass
lstrcmpA
LocalFree
LocalAlloc
TerminateProcess
CreateToolhelp32Snapshot
Process32First
GetCurrentProcess
Sleep
CreatePipe
GetStdHandle
GetModuleFileNameA
CreateProcessA
GetLogicalDriveStringsA
lstrlenA
GetKeyboardState
CallNextHookEx
UnhookWindowsHookEx
SetWindowsHookExA
GetWindowTextA
GetActiveWindow
ExitWindowsEx
ToAscii
CharUpperA
OpenInputDesktop
OpenWindowStationA
SetProcessWindowStation
OpenDesktopA
SetThreadDesktop
PostMessageA
SetCursorPos
SendInput
IsWindow
SendMessageA
DispatchMessageA
GetMessageA
wsprintfA
DestroyWindow
GetCurrentObject
CreateDCA
GetDeviceCaps
DeleteDC
CloseServiceHandle
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
ChangeServiceConfigA
OpenServiceA
OpenSCManagerA
StartServiceA
ControlService
DeleteService
EnumServicesStatusA
QueryServiceConfigA
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
RegisterServiceCtrlHandlerA
SetServiceStatus
QueryServiceStatus
CreateServiceA
ImpersonateSelf
OpenThreadToken
RegCreateKeyExA
RegSetValueExA
SHEmptyRecycleBinA
ShellExecuteA
SHFileOperationA
CreateStreamOnHGlobal
capCreateCaptureWindowA
LoadProfile
ServiceMain
TestFunc
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ