Fibxy
PassWordA
PassWordB
ServerDll
UsernameA
Static task
static1
Behavioral task
behavioral1
Sample
cdf234b181d81a9cdd21d0f459da2acc_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
cdf234b181d81a9cdd21d0f459da2acc_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
cdf234b181d81a9cdd21d0f459da2acc_JaffaCakes118
Size
108KB
MD5
cdf234b181d81a9cdd21d0f459da2acc
SHA1
ea1222e8e4e6ac2954792f563f852bdc6e2febad
SHA256
e6b3730152c6a0702946e816e693dbba25c88a44c312451a851b5cf5197f66ad
SHA512
80cd309a45878f86c0bf25775d7b5bb923e9353dc033ff9aa89d9b08929c038877f6af6d7b97bd03da43be47cc00ff6f0023d2f32b130f50d6f66c8021e38e6c
SSDEEP
3072:ALiNGM1w+vAmxDkessgndCMO25tXrMqOy:AeNP1PD0nYBUtXoqO
Checks for missing Authenticode signature.
resource |
---|
cdf234b181d81a9cdd21d0f459da2acc_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetLocalTime
MapViewOfFile
CreateFileMappingA
HeapFree
GetProcessHeap
HeapAlloc
UnmapViewOfFile
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalSize
GetStartupInfoA
CreatePipe
DisconnectNamedPipe
SetFilePointer
GetTickCount
WaitForMultipleObjects
OutputDebugStringA
GlobalMemoryStatusEx
GetSystemInfo
ReleaseMutex
OpenEventA
SetErrorMode
CreateMutexA
SetUnhandledExceptionFilter
FreeConsole
LocalSize
lstrcmpiA
GetCurrentThreadId
WriteProcessMemory
CreateRemoteThread
CreateToolhelp32Snapshot
MoveFileExA
OpenProcess
PeekNamedPipe
VirtualAllocEx
ReadFile
Process32First
GetFileSize
RemoveDirectoryA
LocalAlloc
FindFirstFileA
LocalReAlloc
FindNextFileA
LocalFree
FindClose
GetLogicalDriveStringsA
GetVolumeInformationA
GetDiskFreeSpaceExA
GetDriveTypeA
CreateProcessA
GetFileAttributesA
CreateDirectoryA
GetLastError
DeleteFileA
GetVersionExA
GetPrivateProfileStringA
lstrcmpA
WideCharToMultiByte
MultiByteToWideChar
LoadLibraryA
GetProcAddress
FreeLibrary
GetWindowsDirectoryA
lstrcatA
GetPrivateProfileSectionNamesA
lstrlenA
Sleep
CancelIo
InterlockedExchange
lstrcpyA
ResetEvent
VirtualAlloc
EnterCriticalSection
LeaveCriticalSection
VirtualFree
DeleteCriticalSection
InitializeCriticalSection
CreateThread
CreateEventA
ResumeThread
SetEvent
WaitForSingleObject
TerminateThread
CloseHandle
Process32Next
DeviceIoControl
GetVersion
GetCurrentProcess
GetSystemDirectoryA
SetLastError
GetModuleFileNameA
MoveFileA
CreateFileA
WriteFile
TerminateProcess
WindowFromPoint
SetCursorPos
mouse_event
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
GetClipboardData
GetSystemMetrics
SetRect
GetDC
GetDesktopWindow
ReleaseDC
GetCursorPos
UnhookWindowsHookEx
keybd_event
SetCapture
GetProcessWindowStation
CreateWindowExA
LoadMenuA
RegisterClassA
LoadIconA
GetWindowThreadProcessId
IsWindowVisible
EnumWindows
IsWindow
CloseWindow
SystemParametersInfoA
SendMessageA
BlockInput
SetWindowsHookExA
DispatchMessageA
CallNextHookEx
GetKeyNameTextA
OpenWindowStationA
MapVirtualKeyA
DestroyCursor
SetProcessWindowStation
LoadCursorA
TranslateMessage
GetMessageA
wsprintfA
CharNextA
MessageBoxA
ExitWindowsEx
GetWindowTextA
GetCursorInfo
GetActiveWindow
PostMessageA
OpenDesktopA
GetThreadDesktop
GetUserObjectInformationA
OpenInputDesktop
SetThreadDesktop
CloseDesktop
BitBlt
DeleteDC
DeleteObject
GetDIBits
CreateDIBSection
SelectObject
GetStockObject
CreateCompatibleBitmap
CreateCompatibleDC
RegCloseKey
LookupAccountNameA
LsaClose
LsaRetrievePrivateData
LsaOpenPolicy
LsaFreeMemory
RegQueryValueA
RegOpenKeyExA
CloseServiceHandle
DeleteService
ControlService
QueryServiceStatus
OpenServiceA
OpenSCManagerA
RegSetValueExA
RegCreateKeyA
RegQueryValueExA
RegOpenKeyA
CloseEventLog
ClearEventLogA
OpenEventLogA
RegCreateKeyExA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
FreeSid
SetSecurityDescriptorDacl
AddAccessAllowedAce
InitializeAcl
GetLengthSid
AllocateAndInitializeSid
InitializeSecurityDescriptor
RegEnumKeyExA
RegEnumValueA
RegDeleteKeyA
RegDeleteValueA
CreateProcessAsUserA
SetTokenInformation
DuplicateTokenEx
RegisterServiceCtrlHandlerA
SetServiceStatus
LookupAccountSidA
GetTokenInformation
IsValidSid
SHGetSpecialFolderPathA
SHGetFileInfoA
SHDeleteKeyA
_strnicmp
_strupr
_strcmpi
_adjust_fdiv
_initterm
??1type_info@@UAE@XZ
calloc
_beginthreadex
wcstombs
realloc
strncat
_snprintf
wcscpy
_errno
strncmp
atoi
strncpy
strcat
strrchr
_except_handler3
free
strcmp
strcpy
malloc
strchr
_CxxThrowException
memcmp
strstr
strlen
_ftol
ceil
memmove
__CxxFrameHandler
memcpy
??3@YAXPAX@Z
??2@YAPAXI@Z
memset
waveInReset
waveInStop
waveOutWrite
waveInStart
waveOutClose
waveInPrepareHeader
waveInOpen
waveInGetNumDevs
waveOutPrepareHeader
waveOutOpen
waveOutGetNumDevs
waveOutUnprepareHeader
waveOutReset
waveInClose
waveInAddBuffer
waveInUnprepareHeader
WSACleanup
WSAIoctl
connect
inet_addr
htons
gethostbyname
socket
closesocket
ntohs
recv
select
send
inet_ntoa
gethostname
ioctlsocket
__WSAFDIsSet
recvfrom
sendto
listen
accept
getpeername
bind
getsockname
WSAStartup
setsockopt
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
NetLocalGroupAddMembers
NetUserAdd
ImmReleaseContext
ImmGetContext
ImmGetCompositionStringA
InternetReadFile
InternetOpenUrlA
InternetOpenA
InternetCloseHandle
capGetDriverDescriptionA
capCreateCaptureWindowA
ICOpen
ICSeqCompressFrameEnd
ICSeqCompressFrame
ICSeqCompressFrameStart
ICSendMessage
ICClose
ICCompressorFree
WTSFreeMemory
WTSQueryUserToken
WTSQuerySessionInformationA
CreateEnvironmentBlock
EnumProcessModules
GetModuleFileNameExA
Fibxy
PassWordA
PassWordB
ServerDll
UsernameA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ