DealA
DealB
DealC
Static task
static1
Behavioral task
behavioral1
Sample
dd49a88f2b47a0f122b4d60e6aca1591_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
dd49a88f2b47a0f122b4d60e6aca1591_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
dd49a88f2b47a0f122b4d60e6aca1591_JaffaCakes118
Size
186KB
MD5
dd49a88f2b47a0f122b4d60e6aca1591
SHA1
1aa92048097933665173cd9a6512841008bc5612
SHA256
d7633b188276cc3e897318080404691d9104af705881a364170a655eeab5c551
SHA512
630e0b33dc0d19aec819acb49aad45e1ce1898691866690b77857d7a9a02e127d2534005abe15754c4b3996bcc3169dc329c60315842975fcbeaae71e769291a
SSDEEP
3072:ZsS21F3DRRyeXV7XnRwM/LW9T5UQJNOK/nTcvaOsqGkY3+W45OO:ZsS2jRRyeZXRwMq5U2QK/Gt6kM+WhO
Checks for missing Authenticode signature.
resource |
---|
dd49a88f2b47a0f122b4d60e6aca1591_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_Xlen@std@@YAXXZ
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?substr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBE?AV12@II@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?find@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDII@Z
?erase@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@II@Z
?insert@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@IPBDI@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?rfind@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDII@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
SHSetValueA
SHGetValueA
SHDeleteValueA
strtok
_mkdir
__dllonexit
_onexit
_except_handler3
?terminate@@YAXXZ
_initterm
_adjust_fdiv
longjmp
__CxxLongjmpUnwind
_setjmp3
??1type_info@@UAE@XZ
wprintf
strncmp
_CxxThrowException
_stat
_strnicmp
_strlwr
time
__CxxFrameHandler
??2@YAPAXI@Z
strrchr
getenv
rand
srand
fwrite
fread
fclose
ftell
fseek
_stricmp
fopen
_access
sprintf
atoi
strstr
malloc
free
vsprintf
mktime
localtime
_mbsnbicmp
rename
_snprintf
printf
memmove
sscanf
atol
wcslen
wcscat
wcscpy
strncpy
isspace
abort
strchr
strftime
WSAStartup
sendto
socket
bind
recvfrom
htons
gethostname
gethostbyname
ntohl
inet_addr
ntohs
GetAdaptersInfo
RasGetEntryDialParamsA
RasEnumEntriesA
RasEnumConnectionsA
SetupDiGetClassDevsA
SetupDiEnumDeviceInfo
SetupDiGetDeviceRegistryPropertyA
SetupDiDestroyDeviceInfoList
SetupDiCallClassInstaller
SetupDiSetClassInstallParamsA
Netbios
GetUserNameA
LookupAccountNameA
ConvertSidToStringSidW
LsaOpenPolicy
LsaRetrievePrivateData
LsaClose
RegConnectRegistryA
RegOpenKeyA
RegEnumKeyA
StartServiceA
CreateServiceA
RegQueryInfoKeyA
RegEnumKeyExA
RegCreateKeyExA
RegSetValueExA
OpenSCManagerA
RegOpenKeyExW
RegQueryValueExW
OpenServiceA
ControlService
CloseServiceHandle
DeleteService
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
RegEnumValueA
GetSystemMetrics
CloseDesktop
CloseWindowStation
ReleaseDC
GetDC
SetThreadDesktop
OpenDesktopA
SetProcessWindowStation
wsprintfW
IsCharAlphaNumericA
DispatchMessageA
TranslateMessage
GetMessageA
SetTimer
CreateWindowExA
RegisterClassExA
SendMessageA
SetClipboardViewer
wsprintfA
ChangeClipboardChain
OpenWindowStationA
GetThreadDesktop
GetProcessWindowStation
CloseClipboard
GetWindowTextA
GetForegroundWindow
GetClipboardData
OpenClipboard
GetPriorityClipboardFormat
DefWindowProcA
PostQuitMessage
GetErrorInfo
VariantClear
VariantInit
CreateMutexA
GetModuleFileNameA
OutputDebugStringA
SetFileTime
LocalFileTimeToFileTime
GetFileTime
GetCurrentThreadId
GetExitCodeThread
WritePrivateProfileStringA
GetSystemDirectoryW
GetVolumeInformationW
GetDiskFreeSpaceExW
GetLogicalDrives
GetVolumeInformationA
GetDiskFreeSpaceExA
GetLogicalDriveStringsA
GetDriveTypeA
FileTimeToLocalFileTime
SetFileAttributesA
lstrcatA
lstrcpyA
SetFilePointer
GetWindowsDirectoryA
FindNextFileA
FindClose
GetCurrentProcessId
GetCurrentThread
GetCurrentProcess
CreateToolhelp32Snapshot
Process32First
Process32Next
GetSystemDefaultLCID
GetEnvironmentVariableA
WideCharToMultiByte
GetPrivateProfileIntA
GetPrivateProfileStringA
InterlockedCompareExchange
OpenProcess
TerminateProcess
CreatePipe
GetStartupInfoA
GetVersionExA
GetSystemDirectoryA
MoveFileExA
GetModuleHandleW
TerminateThread
LocalFree
LocalAlloc
lstrlenA
SetLastError
WriteFile
CreateFileW
MultiByteToWideChar
GetProcAddress
InterlockedIncrement
InterlockedDecrement
GetLocalTime
GetTempPathA
GetTickCount
FindFirstFileA
CopyFileA
DeleteFileA
MoveFileA
BeginUpdateResourceA
UpdateResourceA
EndUpdateResourceA
CloseHandle
CreateProcessA
Sleep
GetLastError
InterlockedExchange
FreeLibrary
SizeofResource
LockResource
LoadResource
FindResourceA
FileTimeToSystemTime
CreateThread
GlobalAlloc
GlobalLock
GlobalHandle
GlobalUnlock
GlobalFree
DeviceIoControl
GetFileSize
ReadFile
CreateFileA
SystemTimeToFileTime
LoadLibraryA
ord800
ord535
ord860
ord540
ord6877
ord2818
ord858
ord924
ord4129
ord5683
ord537
GetStockObject
SelectPalette
RealizePalette
GetDIBits
DeleteObject
DeleteDC
GetPixel
CreateDCA
CreateCompatibleDC
CreateCompatibleBitmap
SelectObject
BitBlt
GetDeviceCaps
SHGetSpecialFolderLocation
SHGetSpecialFolderPathA
SHGetPathFromIDListA
StgOpenStorage
StgIsStorageFile
CoUninitialize
CoTaskMemFree
CoInitialize
CoCreateInstance
DealA
DealB
DealC
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ