ClamAV
DrWeb
Ewido
eSafe
hhacknet
Static task
static1
Behavioral task
behavioral1
Sample
e12d2807820457c82fc32af1040a8b57_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
e12d2807820457c82fc32af1040a8b57_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
e12d2807820457c82fc32af1040a8b57_JaffaCakes118
Size
112KB
MD5
e12d2807820457c82fc32af1040a8b57
SHA1
f8324ec8924d48a75454618973c98221ebf9b7e2
SHA256
f46373fa4be48a0f5044784e5a6b19febb14e42139053ab018378628d20c852e
SHA512
da872b6c1329432edaefe110e84e6667872efd3f89ab2f468cddb2fef93b69f7b4d9f644962b0fab4ef3f2b1ec5f8b3a1aae5ed426a2c5e5439cc102b14fba0b
SSDEEP
3072:WCsobZbIyWRLTqMe7i6ain4tU3jfnAeL4jhAS:WCxbZbELTKFngs/BUjh1
Checks for missing Authenticode signature.
resource |
---|
e12d2807820457c82fc32af1040a8b57_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
_strcmpi
_strnset
_strrev
_strnicmp
_strupr
_adjust_fdiv
_initterm
??1type_info@@UAE@XZ
calloc
_beginthreadex
wcstombs
realloc
strncat
wcscpy
_errno
strncmp
_snprintf
atoi
strncpy
strrchr
strcat
_except_handler3
free
strcmp
strcpy
malloc
strchr
memcmp
??2@YAPAXI@Z
memset
__CxxFrameHandler
strstr
strlen
_ftol
ceil
memmove
memcpy
??3@YAXPAX@Z
MultiByteToWideChar
EnterCriticalSection
DeleteFileA
GetLastError
CreateDirectoryA
GetDriveTypeA
FindClose
LocalFree
FindNextFileA
LocalReAlloc
FindFirstFileA
LocalAlloc
GetFileSize
ReadFile
SetFilePointer
WriteFile
Sleep
GetModuleFileNameA
SetLastError
GetSystemDirectoryA
lstrcatA
GetCurrentProcess
GetVersion
DeviceIoControl
CreateRemoteThread
OpenProcess
GetLocalTime
TerminateThread
CreateEventA
MoveFileExA
GetTickCount
GetFileAttributesA
WaitForSingleObject
GlobalUnlock
GlobalLock
GlobalSize
GlobalFree
GlobalAlloc
OpenEventA
DeleteCriticalSection
LoadLibraryA
GetProcAddress
lstrlenA
InterlockedExchange
SetEvent
lstrcpyA
CloseHandle
FreeLibrary
ExitProcess
VirtualAlloc
GetVersionExA
ReleaseDC
GetDesktopWindow
GetDC
SetRect
EmptyClipboard
SetClipboardData
GetCursorPos
CloseClipboard
SetProcessWindowStation
SetCursorPos
WindowFromPoint
SetCapture
MapVirtualKeyA
OpenClipboard
GetCursorInfo
wsprintfA
ExitWindowsEx
MessageBoxA
GetWindowTextA
GetProcessWindowStation
GetWindowThreadProcessId
IsWindowVisible
GetThreadDesktop
PostMessageA
CreateWindowExA
GetSystemMetrics
CloseWindow
SendMessageA
IsWindow
mouse_event
GetForegroundWindow
GetAsyncKeyState
GetKeyState
EnumWindows
LoadCursorA
DestroyCursor
SystemParametersInfoA
GetDIBits
BitBlt
DeleteDC
DeleteObject
CreateCompatibleDC
CreateDIBSection
SelectObject
CreateCompatibleBitmap
RegSetValueExA
OpenServiceA
QueryServiceStatus
ControlService
DeleteService
RegOpenKeyExA
RegCloseKey
RegQueryValueA
SetServiceStatus
RegisterServiceCtrlHandlerA
RegDeleteValueA
RegDeleteKeyA
RegEnumValueA
RegEnumKeyExA
RegQueryValueExA
RegOpenKeyA
RegCreateKeyExA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
gethostname
recvfrom
inet_ntoa
WSACleanup
getpeername
getsockname
bind
inet_addr
recv
ioctlsocket
send
select
ntohs
closesocket
socket
WSAStartup
connect
htons
gethostbyname
__WSAFDIsSet
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
NetLocalGroupAddMembers
NetUserAdd
ICOpen
ICSeqCompressFrameEnd
ICSeqCompressFrame
ICSeqCompressFrameStart
ICSendMessage
ICClose
ICCompressorFree
ClamAV
DrWeb
Ewido
eSafe
hhacknet
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ