DllRegisterServer
DllUnregisterServer
ServiceMain
SvchostPushServiceGlobals
WUServiceMain
_crt_debugger_hook
Static task
static1
Behavioral task
behavioral1
Sample
de7500fc1065a081180841f32f06a537_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
de7500fc1065a081180841f32f06a537_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
de7500fc1065a081180841f32f06a537_JaffaCakes118
Size
136KB
MD5
de7500fc1065a081180841f32f06a537
SHA1
2004f191a052cee6b033acc518f1c64bb0b00ecd
SHA256
95e08990fdf11251e9ee935f0b2e075667133758bc68c4d390e82f041a54e4b3
SHA512
2a0d8e94998650cda91b64aeb4259fa6e4e00bd9d49769b37e5c98556c03addc1785654446c2759195cb7558f3553e155e9ee8d93a433211a308cbef3a9b34b9
SSDEEP
3072:Pk5WpezDE6SWpAWF+BqBZZHm5ZkXTNtW7d4efrOnrsyTD:CztSWKWcBqBPHmOMd4efWhD
Checks for missing Authenticode signature.
resource |
---|
de7500fc1065a081180841f32f06a537_JaffaCakes118 |
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetModuleFileNameW
DisableThreadLibraryCalls
CreateRemoteThread
VirtualFreeEx
VirtualProtectEx
VirtualAllocEx
CopyFileA
RtlUnwind
IsDebuggerPresent
SetUnhandledExceptionFilter
ExitProcess
MoveFileExW
GetSystemDirectoryA
MoveFileExA
GetSystemDirectoryW
LoadLibraryExA
GetPrivateProfileStringA
GetPrivateProfileIntA
Sleep
GetTempPathW
GetCurrentThreadId
GetTickCount
GetVersionExA
GetSystemTime
GetWindowsDirectoryW
SetFileTime
SystemTimeToFileTime
GetComputerNameA
ExpandEnvironmentStringsW
GetSystemInfo
GlobalFree
UnhandledExceptionFilter
SetLastError
GetExitCodeProcess
GetFileAttributesA
FormatMessageW
FormatMessageA
GetCurrentThread
SetErrorMode
GetDiskFreeSpaceExA
GetFileTime
GetFileSizeEx
CreateFileW
GetDriveTypeA
SetFilePointer
LocalFree
DeleteFileW
DuplicateHandle
FindNextFileW
GetModuleHandleA
CreatePipe
RemoveDirectoryW
LocalAlloc
ProcessIdToSessionId
LoadLibraryA
FindClose
GetProcessVersion
MoveFileW
GetProcAddress
MultiByteToWideChar
ReadFile
FileTimeToSystemTime
TerminateProcess
GetFileAttributesW
CopyFileW
LoadLibraryW
WideCharToMultiByte
OpenProcess
WaitForSingleObject
WriteFile
CreateDirectoryW
GetCurrentProcess
CreateProcessW
FreeLibrary
PeekNamedPipe
FindFirstFileW
CreateThread
CloseHandle
DeleteCriticalSection
ResetEvent
EnterCriticalSection
GetLastError
ExitThread
LeaveCriticalSection
CreateEventA
TerminateThread
InitializeCriticalSection
GetSystemTimeAsFileTime
SetEvent
WriteProcessMemory
GetMessageA
ExitWindowsEx
GetSystemMetrics
GetDesktopWindow
ReleaseDC
CloseDesktop
OpenInputDesktop
OpenWindowStationA
GetDC
GetProcessWindowStation
SetProcessWindowStation
GetWindowRect
GetWindowDC
CloseWindowStation
SetThreadDesktop
GetThreadDesktop
GetDIBits
DeleteObject
SelectObject
CreateCompatibleDC
StretchBlt
RealizePalette
SelectPalette
GetObjectA
GetStockObject
CreateCompatibleBitmap
DeleteDC
RegSetValueExW
RegOpenKeyW
RegSetValueExA
RegCreateKeyW
CryptHashData
LsaFreeMemory
ConvertSidToStringSidW
LsaRetrievePrivateData
CryptDestroyHash
RegEnumValueA
CryptCreateHash
CredEnumerateW
LsaClose
RegOpenKeyExA
CryptAcquireContextA
RegEnumKeyExA
CredFree
CryptReleaseContext
RegQueryValueExA
LsaOpenPolicy
CryptGetHashParam
ControlService
RegOpenKeyExW
RegEnumValueW
OpenSCManagerA
EnumServicesStatusW
RegDeleteValueW
RegQueryInfoKeyA
StartServiceW
OpenServiceW
EnumServicesStatusA
DeleteService
CloseServiceHandle
RegCloseKey
RegEnumKeyExW
RegQueryValueExW
RegCreateKeyExW
AdjustTokenPrivileges
GetLengthSid
IsValidSecurityDescriptor
GetUserNameA
FreeSid
RevertToSelf
AddAccessAllowedAce
SetSecurityDescriptorOwner
AllocateAndInitializeSid
InitializeAcl
LookupAccountSidW
ImpersonateSelf
LookupPrivilegeValueA
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
LookupAccountSidA
AccessCheck
GetTokenInformation
SetSecurityDescriptorGroup
OpenThreadToken
CloseEventLog
OpenEventLogA
ClearEventLogA
DuplicateTokenEx
CreateProcessAsUserW
OpenProcessToken
ImpersonateLoggedOnUser
RegDeleteValueA
RegOpenKeyA
RegCreateKeyA
SHFileOperationW
CommandLineToArgvW
CoInitialize
CoUninitialize
CoCreateInstance
GetNetworkParams
GetAdaptersInfo
ZwQuerySystemInformation
shutdown
recv
send
ioctlsocket
gethostbyname
getpeername
connect
inet_ntoa
WSAStartup
recvfrom
inet_addr
setsockopt
listen
select
accept
htonl
WSAGetLastError
htons
socket
bind
sendto
getsockname
ntohs
closesocket
SHDeleteKeyA
PathCanonicalizeW
SHDeleteKeyW
EnumProcesses
GetModuleBaseNameA
GetModuleFileNameExW
InternetQueryOptionA
CryptUnprotectData
LoadUserProfileA
GetUserProfileDirectoryA
UnloadUserProfile
RasEnumEntriesW
RasGetEntryDialParamsW
strncpy
memset
rand
??3@YAXPAX@Z
_time64
strcat
wcscat
_wtoi
_snwprintf
wcsncpy
_wfopen
wcsncat
fgetws
wcslen
wcsrchr
_vsnwprintf
_purecall
isprint
wcscpy
fclose
??2@YAPAXI@Z
sprintf
strcpy
wcsstr
realloc
wcscmp
isspace
wcstombs
_snprintf
strncmp
strstr
atoi
strcmp
wcschr
strncat
??_U@YAPAXI@Z
_wcsnicmp
strrchr
_wtof
strchr
isalnum
fopen
??_V@YAXPAX@Z
fread
srand
_stricmp
_wcsicmp
_wcsupr
_strnicmp
_CxxThrowException
??1type_info@@UAE@XZ
_initterm
_adjust_fdiv
?terminate@@YAXXZ
_except_handler3
memmove
malloc
free
memcpy
toupper
_ftol
strlen
__CxxFrameHandler
GetErrorInfo
DllRegisterServer
DllUnregisterServer
ServiceMain
SvchostPushServiceGlobals
WUServiceMain
_crt_debugger_hook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ