ResetSSDT
ServiceMain
Static task
static1
Behavioral task
behavioral1
Sample
c9038233bcf6028392bc5604e1504b6a_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c9038233bcf6028392bc5604e1504b6a_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
c9038233bcf6028392bc5604e1504b6a_JaffaCakes118
Size
187KB
MD5
c9038233bcf6028392bc5604e1504b6a
SHA1
f18b69a08cc11fc143bccc2318f904662de55dbe
SHA256
66ae8c62af7dbaa05f6666d365548584fc6f98f9228e6be72566fd278a25140a
SHA512
66ddb5bc704747fdba2d122ed2294f168eb0415d217266f11bdd71985e81c1af89978177c32a6850da027b7323ab4fce98855f19cb72ebc58a15f148c2158b60
SSDEEP
3072:jGmLhmrNKRRCsRauZKY4sEhrMjJbXgAZ4+2Q7glYe+34otNmQh2ohMFMYo3:6dkRwTAK/sESlrgAm+2Qf4roD
Checks for missing Authenticode signature.
resource |
---|
c9038233bcf6028392bc5604e1504b6a_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
CreateProcessA
GetTempPathA
MoveFileExA
GetTickCount
GetLocalTime
GetModuleHandleA
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalSize
InterlockedExchange
GetStartupInfoA
CreatePipe
DisconnectNamedPipe
TerminateProcess
PeekNamedPipe
WaitForMultipleObjects
SizeofResource
GetFileAttributesA
FindResourceA
DeviceIoControl
LoadLibraryExA
OpenEventA
SetErrorMode
SetUnhandledExceptionFilter
FreeConsole
LocalSize
OpenProcess
Process32Next
Process32First
CreateToolhelp32Snapshot
GetCurrentProcess
lstrcmpiA
MoveFileA
LocalFree
FindClose
GetLogicalDriveStringsA
GetSystemDirectoryA
GetLastError
SetLastError
LoadResource
WriteFile
SetFilePointer
DeleteCriticalSection
VirtualFree
LeaveCriticalSection
EnterCriticalSection
VirtualAlloc
CreateEventA
CloseHandle
TerminateThread
InitializeCriticalSection
lstrcpyA
ResetEvent
WaitForSingleObject
SetEvent
CancelIo
Sleep
lstrlenA
GetPrivateProfileSectionNamesA
lstrcatA
GetWindowsDirectoryA
FreeLibrary
GetProcAddress
LoadLibraryA
MultiByteToWideChar
WideCharToMultiByte
lstrcmpA
GetPrivateProfileStringA
GetVersionExA
DeleteFileA
GetDriveTypeA
GetDiskFreeSpaceExA
GetVolumeInformationA
ReadFile
CreateFileA
GetFileSize
RemoveDirectoryA
LocalAlloc
FindFirstFileA
LocalReAlloc
GetCurrentThreadId
FindNextFileA
CreateWindowExA
PostMessageA
GetThreadDesktop
GetUserObjectInformationA
OpenInputDesktop
SetThreadDesktop
CloseDesktop
EnumWindows
GetWindowThreadProcessId
CloseWindow
GetProcessWindowStation
OpenWindowStationA
SetProcessWindowStation
CloseWindowStation
GetCursorPos
ReleaseDC
GetDesktopWindow
GetDC
GetSystemMetrics
SetRect
GetClipboardData
ExitWindowsEx
IsWindow
IsWindowVisible
wsprintfA
GetWindowTextA
GetActiveWindow
GetKeyNameTextA
GetFocus
CallNextHookEx
OpenDesktopA
SetWindowsHookExA
UnhookWindowsHookEx
SendMessageA
SystemParametersInfoA
keybd_event
OpenClipboard
EmptyClipboard
SetClipboardData
CloseClipboard
mouse_event
SetCursorPos
WindowFromPoint
SetCapture
MapVirtualKeyA
DeleteDC
SelectObject
GetPaletteEntries
CreateHalftonePalette
BitBlt
DeleteObject
CreateCompatibleDC
CreateDIBSection
GetTokenInformation
LookupAccountSidA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
SetServiceStatus
RegisterServiceCtrlHandlerExA
StartServiceA
OpenEventLogA
ClearEventLogA
CloseEventLog
RegQueryValueA
RegOpenKeyExA
RegOpenKeyA
RegQueryValueExA
RegCreateKeyA
RegSetValueExA
RegCloseKey
OpenSCManagerA
OpenServiceA
QueryServiceStatus
ControlService
DeleteService
CloseServiceHandle
LsaFreeMemory
LsaOpenPolicy
LsaRetrievePrivateData
LsaClose
LookupAccountNameA
IsValidSid
SHGetFileInfoA
SHGetSpecialFolderPathA
SHDeleteKeyA
_except_handler3
strncpy
strrchr
realloc
atoi
wcstombs
_beginthreadex
malloc
free
??1type_info@@UAE@XZ
_initterm
_adjust_fdiv
strchr
_CxxThrowException
??2@YAPAXI@Z
__CxxFrameHandler
_strcmpi
strstr
_ftol
ceil
memmove
calloc
??3@YAXPAX@Z
gethostname
connect
getsockname
WSACleanup
WSAStartup
htons
gethostbyname
ntohs
recv
setsockopt
send
select
closesocket
socket
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?_Xran@std@@YAXXZ
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_Refcnt@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEAAEPBD@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
MakeSureDirectoryPathExists
ImmGetContext
ImmGetCompositionStringA
ImmReleaseContext
InternetOpenUrlA
InternetReadFile
InternetCloseHandle
InternetOpenA
URLDownloadToFileA
capGetDriverDescriptionA
capCreateCaptureWindowA
EnumProcessModules
GetModuleFileNameExA
WTSFreeMemory
WTSQuerySessionInformationA
ResetSSDT
ServiceMain
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ