CreateLogObjects
Run
Static task
static1
Behavioral task
behavioral1
Sample
dd5daeac27bac0915e56f240fe8255dd_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dd5daeac27bac0915e56f240fe8255dd_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
dd5daeac27bac0915e56f240fe8255dd_JaffaCakes118
Size
2.7MB
MD5
dd5daeac27bac0915e56f240fe8255dd
SHA1
cee00a503039f5399052adaf87b6e35e4fc01dd8
SHA256
0158abd949b4aa84d615450cdfd60efe71ac8887d22f64cef16ce67d18737f8f
SHA512
c1c8b570f374109c0492e4bf545c0f7036eb00772110893b6e35a58523f0bd2e85e88e366b14f78c4722d81dc538eefb2ab7ad4435a66d4875a406ba1329b241
SSDEEP
3072:OxIp7IyyEIABVXqGn1zWPGYuX2dqcBewGO/2:Oep7RIABVXqG1zvX29e
Checks for missing Authenticode signature.
resource |
---|
dd5daeac27bac0915e56f240fe8255dd_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
lstrcpyA
GetLocalTime
MultiByteToWideChar
CreateThread
GetModuleHandleA
lstrcmpA
WideCharToMultiByte
lstrcatA
GetPrivateProfileSectionNamesA
lstrlenA
Sleep
InterlockedExchange
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
GetProcAddress
DeviceIoControl
SetErrorMode
lstrcmpiA
GetCommandLineA
CloseHandle
DeleteFileA
GetPrivateProfileStringA
GetMessageA
UpdateWindow
ShowWindow
CreateWindowExA
TranslateMessage
LoadCursorA
LoadIconA
GetWindowTextA
DispatchMessageA
DefWindowProcA
PostQuitMessage
DestroyCursor
RegisterClassExA
GetWindow
IsWindow
SendMessageA
CloseWindow
PostMessageA
wsprintfA
IsWindowVisible
GetCursorPos
ReleaseDC
GetDC
GetSystemMetrics
SetCursorPos
WindowFromPoint
SetCapture
SystemParametersInfoA
CreateDIBSection
DeleteObject
CreateCompatibleBitmap
BitBlt
DeleteDC
SelectObject
CreateCompatibleDC
GetDIBits
SHGetSpecialFolderPathA
htons
socket
ntohs
select
ioctlsocket
__WSAFDIsSet
inet_addr
getsockname
getpeername
accept
listen
sendto
recvfrom
inet_ntoa
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?_Xran@std@@YAXXZ
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_Refcnt@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEAAEPBD@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
capGetDriverDescriptionA
capCreateCaptureWindowA
GetTokenInformation
LookupAccountSidA
IsValidSid
LookupAccountNameA
LsaClose
LsaRetrievePrivateData
LsaOpenPolicy
LsaFreeMemory
CoUninitialize
CoCreateInstance
CoInitialize
strrchr
strncpy
_adjust_fdiv
_except_handler3
_strnicmp
_snprintf
strncmp
_errno
free
malloc
strchr
_ftol
_CxxThrowException
__CxxFrameHandler
memmove
ceil
strstr
atoi
wcscpy
tolower
strncat
exit
_beginthreadex
_stricmp
_strnset
_strupr
??1type_info@@UAE@XZ
__dllonexit
_onexit
_initterm
??2@YAPAXI@Z
GetModuleFileNameExA
EnumProcessModules
WTSQuerySessionInformationA
WTSFreeMemory
CreateLogObjects
Run
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ