SSSopSSSS
ServiceRouteEx
StartServiceEx
StopSSSS
StopServiceEx
Static task
static1
Behavioral task
behavioral1
Sample
d1e567c39e45233badd5cab98eaec903_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
d1e567c39e45233badd5cab98eaec903_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
d1e567c39e45233badd5cab98eaec903_JaffaCakes118
Size
24KB
MD5
d1e567c39e45233badd5cab98eaec903
SHA1
c3f83fa2405127f7f3063843fe5c71091dda2996
SHA256
96b04645e8f3eb5fb1558725fc9a0182ed87dcc9cc88d35080ce8f489174c58b
SHA512
098d414c95f3c86da8beb7b887ef353832f32b59baa1ebe309e3883102b3820ec3b83924e0125637d85623fadd170e81d80f9446a8576a06f2cd9075921392fc
SSDEEP
384:iaQq1G+hBsaVCjR95RuBBQARQkG78H4e8C:R1G+hBspvmBBQARQkg8H4
Checks for missing Authenticode signature.
resource |
---|
d1e567c39e45233badd5cab98eaec903_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
SetEvent
WriteProcessMemory
WaitForSingleObject
MultiByteToWideChar
GetCurrentDirectoryA
ReadProcessMemory
GetProcAddress
LoadLibraryA
CreateEventA
lstrlenA
Sleep
CreateThread
WideCharToMultiByte
lstrcatA
GetPrivateProfileStringA
VirtualProtect
CloseHandle
GetModuleFileNameA
SetWindowsHookExA
wsprintfA
SetTimer
KillTimer
CallNextHookEx
UnhookWindowsHookEx
gethostname
send
InternetCloseHandle
InternetOpenA
InternetReadFile
InternetOpenUrlA
_adjust_fdiv
malloc
_initterm
free
strrchr
strcmp
fopen
fputs
fread
fclose
memcmp
strlen
memset
strcpy
strcat
_strlwr
_itoa
SSSopSSSS
ServiceRouteEx
StartServiceEx
StopSSSS
StopServiceEx
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ