DoMainWork
DoService
ServiceMain
Static task
static1
Behavioral task
behavioral1
Sample
dbdfa4e485be3edd07c35dcf03c2a400_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dbdfa4e485be3edd07c35dcf03c2a400_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
dbdfa4e485be3edd07c35dcf03c2a400_JaffaCakes118
Size
69KB
MD5
dbdfa4e485be3edd07c35dcf03c2a400
SHA1
7278159dd14d4fb336b0732416c1186683229721
SHA256
b1ae3050a2b48e1d0cc890939eff95f8ece603fcecd581aa0cda77ab9d642924
SHA512
ee04b878e705e735f8da07a258d4ef84504e0debbc36602180b38d6d9097bcf9751f4ef3414e0fe3ffa758a2f06618885ad0ceb50713207bc4bbfbfbe7b2f84c
SSDEEP
768:I4GuXCvvcL43ImMQEtGqhGwwi5hik24hLsOdh7KgpNtUCJIetWyKnDL/KlFbG6yi:7yvJ3IHXhGwlskvLsU8geoBcT+jyFzg
Checks for missing Authenticode signature.
resource |
---|
dbdfa4e485be3edd07c35dcf03c2a400_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
ExitWindowsEx
CallNextHookEx
GetThreadDesktop
wsprintfA
SetTimer
UnhookWindowsHookEx
SetWindowsHookExA
SendInput
SetCursorPos
PostMessageA
OpenDesktopA
GetForegroundWindow
SetWindowsHookExW
GetWindowTextA
GetWindowThreadProcessId
wsprintfW
GetActiveWindow
CharLowerA
PostThreadMessageA
CharUpperA
EnumWindows
UpdateWindow
BringWindowToTop
ShowWindow
DestroyWindow
DispatchMessageA
OpenInputDesktop
SetThreadDesktop
MessageBoxA
GetMessageA
OpenWindowStationA
SetProcessWindowStation
CloseDesktop
CloseWindowStation
IsWindow
SendMessageA
DeleteObject
CreateCompatibleDC
SelectObject
BitBlt
DeleteDC
GetDeviceCaps
CreateDCA
CreateCompatibleBitmap
GetDIBits
RegQueryValueExA
CreateServiceA
StartServiceA
RegisterServiceCtrlHandlerA
SetServiceStatus
RegEnumValueA
RegEnumKeyExA
RegDeleteValueA
QueryServiceConfigA
EnumServicesStatusA
ChangeServiceConfigA
RegCreateKeyExA
RegSetValueExA
OpenProcessToken
RegOpenKeyExA
OpenServiceA
RegCloseKey
GetUserNameW
LookupPrivilegeValueA
ImpersonateSelf
OpenThreadToken
AdjustTokenPrivileges
OpenSCManagerA
DeleteService
ControlService
CloseServiceHandle
ShellExecuteA
SHFileOperationA
SHEmptyRecycleBinA
CreateStreamOnHGlobal
listen
setsockopt
bind
socket
htons
send
WSASocketA
closesocket
getsockname
ntohs
accept
WSAStartup
select
recv
inet_addr
gethostbyname
inet_ntoa
WSADuplicateSocketA
connect
StrRChrA
StrChrA
StrStrA
StrStrIA
SHDeleteKeyA
StrCmpNIA
StrCmpW
StrToIntA
GetModuleFileNameExA
ImmReleaseContext
ImmGetCompositionStringW
ImmGetCompositionStringA
ImmGetContext
capCreateCaptureWindowA
capGetDriverDescriptionA
waveInUnprepareHeader
waveInPrepareHeader
waveInAddBuffer
waveInStart
waveInStop
waveInClose
waveInOpen
free
wcscmp
malloc
strrchr
__dllonexit
_onexit
_initterm
_adjust_fdiv
strchr
_beginthread
__CxxFrameHandler
??2@YAPAXI@Z
??3@YAXPAX@Z
lstrcatW
lstrlenW
OpenProcess
GetSystemDirectoryA
CreateDirectoryA
MoveFileA
GetDriveTypeA
GetVolumeInformationA
GetDiskFreeSpaceExA
GetLogicalDriveStringsA
GetFileAttributesExA
FindClose
GetLastError
lstrcmpA
FindNextFileA
FindFirstFileA
lstrcmpiA
Process32Next
Process32First
CreateToolhelp32Snapshot
DuplicateHandle
SetStdHandle
CreatePipe
GetStdHandle
GetProcAddress
FreeLibrary
LocalAlloc
InterlockedExchange
FlushFileBuffers
OpenEventA
OpenMutexA
GetFileSize
GlobalAlloc
GlobalLock
lstrcpyW
WaitForMultipleObjects
ResetEvent
ReleaseMutex
GlobalFree
CreateEventA
CreateMutexA
GetFileSizeEx
SetFilePointerEx
ReadFile
GetCurrentProcess
GetPriorityClass
GetThreadPriority
SetPriorityClass
SetThreadPriority
QueryPerformanceFrequency
QueryPerformanceCounter
GetVersion
GetVersionExA
TerminateProcess
GetCommandLineA
ExitProcess
GetSystemInfo
GlobalMemoryStatus
GetComputerNameA
GetACP
GetOEMCP
GetLocalTime
GetTempPathA
WriteFile
GetCurrentThread
SetEvent
GetCurrentProcessId
SetFilePointer
WideCharToMultiByte
SearchPathA
RaiseException
LoadLibraryA
GetModuleFileNameA
lstrlenA
DeviceIoControl
CreateFileA
CloseHandle
DeleteFileA
lstrcpyA
GetStartupInfoA
lstrcatA
CreateProcessA
GetCurrentThreadId
Sleep
WaitForSingleObject
GetTickCount
DoMainWork
DoService
ServiceMain
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ