ServiceMain
StartRouter
Static task
static1
Behavioral task
behavioral1
Sample
e1533dc2147e8f124117585605d61aa9_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e1533dc2147e8f124117585605d61aa9_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
e1533dc2147e8f124117585605d61aa9_JaffaCakes118
Size
128KB
MD5
e1533dc2147e8f124117585605d61aa9
SHA1
fb3a805fada2c64aa05b839d683e41a820f7cf07
SHA256
cc76374b0a77ded309fc3e7599eac8484f111beb5540e98718b8e7ef52d46a55
SHA512
7be10ffdca5a0a6eff8fdbdfe70ba4d676b3262b9edaebe690fc895797642586203919e87a557e317259a07804a131a760fd646762856966cdbd54b5f221bfb9
SSDEEP
3072:pOLvKEx6YXiQerATWlQ5GgaleQKDA8eIERRdMET:ALSMXb3TWlNC5A8NidZT
Checks for missing Authenticode signature.
resource |
---|
e1533dc2147e8f124117585605d61aa9_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
WaitForSingleObject
SetEvent
ResumeThread
CreateThread
CreateEventA
CloseHandle
TerminateThread
GetProcAddress
LoadLibraryA
EnterCriticalSection
VirtualFree
VirtualAlloc
ResetEvent
GetPrivateProfileSectionNamesA
FreeLibrary
lstrcmpA
GetPrivateProfileStringA
GetVersionExA
MoveFileA
CreateProcessA
lstrcpyA
GetDriveTypeA
GetDiskFreeSpaceExA
GetVolumeInformationA
GetLogicalDriveStringsA
LocalFree
FindFirstFileA
RemoveDirectoryA
GetFileSize
CreateFileA
WriteFile
SetLastError
GetModuleFileNameA
ExitThread
SleepEx
lstrlenA
WinExec
WritePrivateProfileStringA
DeleteFileA
GetCurrentProcess
LeaveCriticalSection
Sleep
DeleteCriticalSection
InitializeCriticalSection
GetLocalTime
MapViewOfFile
CreateFileMappingA
GetProcessHeap
UnmapViewOfFile
GlobalFree
GlobalLock
GlobalAlloc
GlobalUnlock
GlobalSize
GetTickCount
GetStartupInfoA
DisconnectNamedPipe
PeekNamedPipe
WaitForMultipleObjects
GetSystemInfo
ReleaseMutex
OpenEventA
SetErrorMode
CreateMutexA
FreeConsole
LocalAlloc
GetLastError
GetCurrentThreadId
RaiseException
InterlockedExchange
strstr
memcmp
strchr
strcat
strcpy
malloc
strcmp
free
_except_handler3
strrchr
strncpy
_CxxThrowException
strlen
strncmp
_errno
exit
realloc
wcstombs
_beginthreadex
calloc
??1type_info@@UAE@XZ
_initterm
_adjust_fdiv
_ftol
ceil
memmove
__CxxFrameHandler
??3@YAXPAX@Z
atoi
??2@YAPAXI@Z
_strupr
_strnicmp
memset
memcpy
_strrev
_strcmpi
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
ICSeqCompressFrame
ServiceMain
StartRouter
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ