COMResModuleInstance
DriverProc
KsCreateAllocator
KsCreatePin
KsCreateTopologyNode
ServerMain
modMessage
modmCallback
Static task
static1
Behavioral task
behavioral1
Sample
ea0032812c8666683b3bb9dc76d28158_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea0032812c8666683b3bb9dc76d28158_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
ea0032812c8666683b3bb9dc76d28158_JaffaCakes118
Size
32KB
MD5
ea0032812c8666683b3bb9dc76d28158
SHA1
921203168cd350001dd863f6815122ab15ecdfc3
SHA256
437f21744ae7c98ad555780d8facf2eafa43fba12fbdbcf335f2208720d7c6df
SHA512
020e78e6d66caf41ba26ae35192b708291910c8b5ef3e64713cf278317de1afb3d75d7297bb0fb6666009f64089ae2c70d34c9dc223ecb05b074d14942079ffc
SSDEEP
768:RUDjbYjOVw9bJm7XJJvsiHBBzhA/ERghu8:R8wOVwhA7XJJvNHBpisRIB
Checks for missing Authenticode signature.
resource |
---|
ea0032812c8666683b3bb9dc76d28158_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
SetFilePointer
GetLastError
CreateEventA
GetModuleFileNameA
GetTempPathA
GetWindowsDirectoryA
GetFileSize
SetFileAttributesA
ExitProcess
GetCommandLineA
GetPrivateProfileStringA
GetCurrentDirectoryA
IsBadReadPtr
GetModuleHandleA
ReadFile
WaitForSingleObject
CreateThread
Sleep
GetSystemDirectoryA
MultiByteToWideChar
DeleteFileA
GlobalLock
CreateFileA
WriteFile
GlobalUnlock
GlobalFree
CloseHandle
LoadLibraryA
GetProcAddress
GlobalAlloc
VirtualProtect
RegisterWindowMessageA
wsprintfA
RegisterShellHookWindow
GetWindowThreadProcessId
EnumWindows
GetWindowTextA
GetClassNameA
CallWindowProcA
GetClientRect
GetParent
GetWindowRect
GetDC
GetDesktopWindow
ReleaseDC
SetWindowLongA
CreateDCA
GetDeviceCaps
DeleteObject
BitBlt
SelectObject
CreateCompatibleBitmap
CreateCompatibleDC
GetDIBits
RealizePalette
SelectPalette
GetStockObject
GetObjectA
DeleteDC
GdiplusShutdown
GdipDisposeImage
GdiplusStartup
GdipGetImageEncoders
GdipGetImageEncodersSize
GdipFree
GdipAlloc
GdipCloneImage
GdipLoadImageFromFile
GdipSaveImageToFile
??0_Lockit@std@@QAE@XZ
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??0Init@ios_base@std@@QAE@XZ
??1Init@ios_base@std@@QAE@XZ
??0_Winit@std@@QAE@XZ
??1_Winit@std@@QAE@XZ
??1_Lockit@std@@QAE@XZ
connect
htons
gethostbyname
socket
recv
send
inet_ntoa
WSAStartup
WSACleanup
inet_addr
closesocket
InternetReadFile
InternetOpenUrlA
InternetOpenA
InternetCloseHandle
_access
strrchr
strcat
memset
strchr
atoi
strcmp
free
__dllonexit
_onexit
_initterm
_adjust_fdiv
_stricmp
_strlwr
_strrev
_getpid
strncmp
strncpy
strstr
abs
sprintf
malloc
wcscmp
strcpy
strlen
??2@YAPAXI@Z
memcpy
__CxxFrameHandler
Netbios
COMResModuleInstance
DriverProc
KsCreateAllocator
KsCreatePin
KsCreateTopologyNode
ServerMain
modMessage
modmCallback
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ