Fibxy
PassWordA
PassWordB
ServerDll
UsernameA
Static task
static1
Behavioral task
behavioral1
Sample
d3abe020b523acfefc82083a072eca41_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d3abe020b523acfefc82083a072eca41_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
d3abe020b523acfefc82083a072eca41_JaffaCakes118
Size
108KB
MD5
d3abe020b523acfefc82083a072eca41
SHA1
ca0981ce67f2779e6c9eef72f559be94a9a58e08
SHA256
f26ac5861cde4136a5740623fe30a648561459c4bc325751a2b70307e81a3f7f
SHA512
2cb74dbdff5607026dded56024e9660d6c261009d27801f91302480ffc86f99e3a3fecc7dcc7fe04c9f1b6057337d01f110e9f4edc4018233734be4aa58e5f40
SSDEEP
3072:I3dhGCKfwsS4+XgFUz28ncq6JcstXufGzD:I3dhJ4Ns2OJ6JztXmGz
Checks for missing Authenticode signature.
resource |
---|
d3abe020b523acfefc82083a072eca41_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
MapViewOfFile
CreateFileMappingA
HeapFree
GetProcessHeap
HeapAlloc
UnmapViewOfFile
GetSystemDirectoryA
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalSize
GetStartupInfoA
CreatePipe
DisconnectNamedPipe
WriteFile
GetLocalTime
WaitForMultipleObjects
OutputDebugStringA
GlobalMemoryStatusEx
GetSystemInfo
ReleaseMutex
OpenEventA
SetErrorMode
CreateMutexA
SetUnhandledExceptionFilter
FreeConsole
LocalSize
lstrcmpiA
GetCurrentThreadId
VirtualAllocEx
WriteProcessMemory
CreateRemoteThread
GetTickCount
MoveFileExA
PeekNamedPipe
OpenProcess
CreateToolhelp32Snapshot
ReadFile
CreateFileA
GetFileSize
RemoveDirectoryA
LocalAlloc
FindFirstFileA
LocalReAlloc
FindNextFileA
LocalFree
FindClose
GetLogicalDriveStringsA
GetVolumeInformationA
GetDiskFreeSpaceExA
GetDriveTypeA
CreateProcessA
GetFileAttributesA
CreateDirectoryA
GetLastError
DeleteFileA
GetVersionExA
GetPrivateProfileStringA
lstrcmpA
WideCharToMultiByte
MultiByteToWideChar
FreeLibrary
LoadLibraryA
GetProcAddress
lstrcatA
GetPrivateProfileSectionNamesA
lstrlenA
Sleep
CancelIo
InterlockedExchange
lstrcpyA
ResetEvent
VirtualAlloc
EnterCriticalSection
LeaveCriticalSection
VirtualFree
CreateEventA
DeleteCriticalSection
InitializeCriticalSection
CreateThread
ResumeThread
SetEvent
Process32First
Process32Next
DeviceIoControl
GetVersion
GetCurrentProcess
ExitProcess
SetLastError
SetFilePointer
MoveFileA
WaitForSingleObject
TerminateThread
CloseHandle
TerminateProcess
WindowFromPoint
SetCursorPos
mouse_event
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
GetClipboardData
GetSystemMetrics
SetRect
GetDC
GetDesktopWindow
ReleaseDC
keybd_event
GetCursorInfo
SetProcessWindowStation
OpenWindowStationA
GetProcessWindowStation
GetWindowThreadProcessId
IsWindowVisible
SetCapture
CloseDesktop
IsWindow
CloseWindow
SystemParametersInfoA
SendMessageA
BlockInput
DestroyCursor
DispatchMessageA
LoadCursorA
UnhookWindowsHookEx
SetWindowsHookExA
CallNextHookEx
GetKeyNameTextA
GetActiveWindow
GetWindowTextA
TranslateMessage
GetMessageA
wsprintfA
CharNextA
MessageBoxA
ExitWindowsEx
EnumWindows
MapVirtualKeyA
GetCursorPos
CreateWindowExA
PostMessageA
OpenDesktopA
GetThreadDesktop
GetUserObjectInformationA
OpenInputDesktop
SetThreadDesktop
DeleteObject
BitBlt
CreateDIBSection
SelectObject
CreateCompatibleBitmap
GetDIBits
CreateCompatibleDC
DeleteDC
CloseServiceHandle
LsaClose
LookupAccountNameA
IsValidSid
LsaOpenPolicy
LsaFreeMemory
RegCloseKey
RegQueryValueA
RegOpenKeyExA
DeleteService
ControlService
QueryServiceStatus
OpenServiceA
OpenSCManagerA
RegSetValueExA
RegCreateKeyA
RegQueryValueExA
RegOpenKeyA
CloseEventLog
ClearEventLogA
OpenEventLogA
RegCreateKeyExA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
FreeSid
SetSecurityDescriptorDacl
AddAccessAllowedAce
InitializeAcl
GetLengthSid
AllocateAndInitializeSid
InitializeSecurityDescriptor
RegEnumKeyExA
RegEnumValueA
RegDeleteKeyA
RegDeleteValueA
CreateProcessAsUserA
SetTokenInformation
DuplicateTokenEx
RegisterServiceCtrlHandlerA
SetServiceStatus
LookupAccountSidA
GetTokenInformation
LsaRetrievePrivateData
SHGetSpecialFolderPathA
SHGetFileInfoA
SHDeleteKeyA
_strnicmp
_strupr
_strcmpi
_adjust_fdiv
_initterm
??1type_info@@UAE@XZ
calloc
_beginthreadex
wcstombs
realloc
strncat
_snprintf
wcscpy
_errno
strncmp
atoi
strncpy
strcat
strrchr
_except_handler3
free
strcmp
strcpy
malloc
strchr
_CxxThrowException
memcmp
strstr
strlen
_ftol
ceil
memmove
__CxxFrameHandler
memcpy
??3@YAXPAX@Z
??2@YAPAXI@Z
memset
waveInReset
waveInStop
waveOutWrite
waveInStart
waveOutClose
waveInPrepareHeader
waveInOpen
waveInGetNumDevs
waveOutPrepareHeader
waveOutOpen
waveOutGetNumDevs
waveOutUnprepareHeader
waveOutReset
waveInClose
waveInAddBuffer
waveInUnprepareHeader
WSACleanup
WSAIoctl
setsockopt
inet_addr
connect
gethostbyname
socket
closesocket
ntohs
recv
select
send
inet_ntoa
gethostname
ioctlsocket
__WSAFDIsSet
recvfrom
sendto
listen
accept
getpeername
bind
getsockname
WSAStartup
htons
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
NetUserAdd
NetLocalGroupAddMembers
ImmReleaseContext
ImmGetContext
ImmGetCompositionStringA
InternetReadFile
InternetOpenUrlA
InternetOpenA
InternetCloseHandle
capGetDriverDescriptionA
capCreateCaptureWindowA
ICOpen
ICClose
ICSendMessage
ICSeqCompressFrameEnd
ICSeqCompressFrame
ICSeqCompressFrameStart
ICCompressorFree
WTSFreeMemory
WTSQueryUserToken
WTSQuerySessionInformationA
CreateEnvironmentBlock
EnumProcessModules
GetModuleFileNameExA
Fibxy
PassWordA
PassWordB
ServerDll
UsernameA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ