ResetSSDT
ServiceMain
Static task
static1
Behavioral task
behavioral1
Sample
d687c337b2c3fd72fb46dd4e6be53e15_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d687c337b2c3fd72fb46dd4e6be53e15_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
d687c337b2c3fd72fb46dd4e6be53e15_JaffaCakes118
Size
109KB
MD5
d687c337b2c3fd72fb46dd4e6be53e15
SHA1
c5b04f9acd3da4ebf7db00eb86ccc75b04c84d33
SHA256
5e9ffdd5163eb82f01f0bff61afc4ac44be01d8108c286839335dd3bbef5bf7c
SHA512
22eb7248f118dec9448706f8e32d94dc0734cacec74d27f10f17ec75be0823a87b9dcde909a1fc00bf4ed238104f219f5e57c791c3867905ddf60d6e6f09dbef
SSDEEP
3072:+33YpfmtWOyKPj6Hu2horGcxJ2gxUnU0qy3tz4OB85t:i3YpfmMKmHkJFOp6OB85
Checks for missing Authenticode signature.
resource |
---|
d687c337b2c3fd72fb46dd4e6be53e15_JaffaCakes118 |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
SHDeleteKeyA
memset
??3@YAXPAX@Z
??2@YAPAXI@Z
memcpy
__CxxFrameHandler3
strstr
ceil
memmove
_CxxThrowException
strchr
malloc
??0exception@std@@QAE@ABQBD@Z
?what@exception@std@@UBEPBDXZ
??1exception@std@@UAE@XZ
free
_strnicmp
_onexit
_lock
__dllonexit
_unlock
__clean_type_info_names_internal
_crt_debugger_hook
?_type_info_dtor_internal_method@type_info@@QAEXXZ
?terminate@@YAXXZ
__CppXcptFilter
_amsg_exit
_initterm_e
_initterm
_encoded_null
_malloc_crt
_except_handler4_common
calloc
_beginthreadex
wcstombs
atoi
realloc
strncat
strncpy
??0exception@std@@QAE@ABV01@@Z
strrchr
_stricmp
FreeLibrary
GetProcAddress
LoadLibraryA
MultiByteToWideChar
WideCharToMultiByte
lstrcmpA
GetPrivateProfileStringA
GetVersionExA
GetLastError
CreateDirectoryA
GetFileAttributesA
CreateProcessA
GetDriveTypeA
GetDiskFreeSpaceExA
GetVolumeInformationA
GetLogicalDriveStringsA
FindClose
LocalFree
FindNextFileA
LocalReAlloc
FindFirstFileA
LocalAlloc
ResumeThread
DeleteFileA
GetFileSize
CreateFileA
WriteFile
SetFilePointer
MoveFileA
ReadFile
GetModuleFileNameA
SetLastError
GetSystemDirectoryA
GetCurrentProcess
CreateRemoteThread
WriteProcessMemory
VirtualAllocEx
OpenProcess
MoveFileExA
GetTickCount
HeapFree
HeapAlloc
GetProcessHeap
GetLocalTime
UnmapViewOfFile
GetWindowsDirectoryA
CreateFileMappingA
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GlobalSize
DisconnectNamedPipe
TerminateProcess
PeekNamedPipe
WaitForMultipleObjects
GetStartupInfoA
CreatePipe
SizeofResource
LoadResource
FindResourceA
DeviceIoControl
LoadLibraryExA
GetModuleHandleA
SetFileAttributesA
ReleaseMutex
OpenEventA
SetErrorMode
CreateMutexA
SetUnhandledExceptionFilter
FreeConsole
LocalSize
Process32Next
Process32First
CreateToolhelp32Snapshot
lstrcmpiA
GetCurrentThreadId
EncodePointer
DecodePointer
InterlockedCompareExchange
UnhandledExceptionFilter
IsDebuggerPresent
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
SetEvent
WaitForSingleObject
TerminateThread
CloseHandle
CreateEventA
lstrcatA
GetPrivateProfileSectionNamesA
lstrlenA
ResetEvent
Sleep
CancelIo
InterlockedExchange
lstrcpyA
EnterCriticalSection
LeaveCriticalSection
VirtualAlloc
VirtualFree
DeleteCriticalSection
InitializeCriticalSection
MapViewOfFile
CreateThread
RemoveDirectoryA
CreateWindowExA
IsWindow
CloseWindow
PostMessageA
OpenDesktopA
GetThreadDesktop
GetUserObjectInformationA
OpenInputDesktop
SetThreadDesktop
CloseDesktop
EnumWindows
IsWindowVisible
GetWindowThreadProcessId
ExitWindowsEx
GetProcessWindowStation
OpenWindowStationA
SetProcessWindowStation
GetCursorPos
SetRect
GetDesktopWindow
GetDC
ReleaseDC
GetCursorInfo
SendMessageA
SystemParametersInfoA
BlockInput
GetSystemMetrics
GetClipboardData
DispatchMessageA
TranslateMessage
GetMessageA
wsprintfA
CharNextA
GetWindowTextA
GetActiveWindow
GetKeyNameTextA
CallNextHookEx
UnhookWindowsHookEx
SetWindowsHookExA
LoadCursorA
DestroyCursor
keybd_event
MapVirtualKeyA
SetCapture
WindowFromPoint
mouse_event
SetCursorPos
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
GetDIBits
DeleteDC
DeleteObject
CreateCompatibleDC
CreateDIBSection
SelectObject
BitBlt
CreateCompatibleBitmap
RegQueryValueExA
RegCreateKeyA
RegSetValueExA
OpenSCManagerA
OpenServiceA
QueryServiceStatus
ControlService
DeleteService
CloseServiceHandle
RegOpenKeyExA
RegQueryValueA
RegCloseKey
LsaFreeMemory
LsaOpenPolicy
LsaRetrievePrivateData
LsaClose
LookupAccountNameA
IsValidSid
GetTokenInformation
LookupAccountSidA
RegisterServiceCtrlHandlerA
SetServiceStatus
StartServiceA
RegCreateKeyExA
RegDeleteKeyA
RegDeleteValueA
RegEnumKeyExA
RegOpenKeyA
CloseEventLog
ClearEventLogA
OpenEventLogA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
FreeSid
SetSecurityDescriptorDacl
AddAccessAllowedAce
InitializeAcl
RegEnumValueA
InitializeSecurityDescriptor
AllocateAndInitializeSid
GetLengthSid
SHGetFileInfoA
SHGetSpecialFolderPathA
waveOutClose
waveOutReset
waveInClose
waveInUnprepareHeader
waveInReset
waveInStop
waveOutPrepareHeader
waveOutOpen
waveOutGetNumDevs
waveInAddBuffer
waveInGetNumDevs
waveOutWrite
waveInStart
waveInPrepareHeader
waveOutUnprepareHeader
waveInOpen
setsockopt
WSACleanup
WSAIoctl
connect
ntohs
gethostbyname
closesocket
recv
select
getsockname
gethostname
socket
send
htons
WSAStartup
?_Xlength_error@std@@YAXPBD@Z
?_Xout_of_range@std@@YAXPBD@Z
ImmGetCompositionStringA
ImmGetContext
ImmReleaseContext
InternetOpenA
InternetOpenUrlA
InternetReadFile
InternetCloseHandle
capCreateCaptureWindowA
capGetDriverDescriptionA
ICSeqCompressFrameStart
ICSendMessage
ICSeqCompressFrameEnd
ICCompressorFree
ICClose
ICSeqCompressFrame
ICOpen
EnumProcessModules
GetModuleFileNameExA
WTSFreeMemory
WTSQuerySessionInformationA
ResetSSDT
ServiceMain
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ