DoMainWork
DoService
ServiceMain
Static task
static1
Behavioral task
behavioral1
Sample
eabab245eb64f65676ec3407833ee894_JaffaCakes118.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
eabab245eb64f65676ec3407833ee894_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
eabab245eb64f65676ec3407833ee894_JaffaCakes118
Size
55KB
MD5
eabab245eb64f65676ec3407833ee894
SHA1
cd46c81f9f7df6ef56d0d7f0d754954fb484f18d
SHA256
6a58108aaa4a44aeda7e18824cef5d50d4f3c1b3928a6d4dcc36b24366bc7f83
SHA512
6039893bb1c367f1a7211cd9f98d7146aeef0b1bebcb4f8ab567794b50d9f21719f458e8b4582cf78218ddfa0a13700aa0bbf3a2d9773fc4cd9fa0f2c89acb94
SSDEEP
768:IGB6Dq6A7doms6X8N4R5++xfuqpmzSslUrHIv4QyhnM/H5OL92ovAg+eyD:rWqp7q+X8qR5++x5vr1jk5OxXyD
Checks for missing Authenticode signature.
resource |
---|
eabab245eb64f65676ec3407833ee894_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
ExitWindowsEx
SetThreadDesktop
GetActiveWindow
GetUserObjectInformationA
EnumChildWindows
SetWindowsHookExW
GetForegroundWindow
OpenWindowStationA
SetProcessWindowStation
CreateDesktopA
SetWindowsHookExA
CallNextHookEx
UnhookWindowsHookEx
IsWindow
SendMessageA
DestroyWindow
GetMessageA
DispatchMessageA
ShowWindow
BringWindowToTop
UpdateWindow
EnumWindows
GetWindowThreadProcessId
GetWindowTextA
CharUpperA
wsprintfA
OpenDesktopA
PostMessageA
SetCursorPos
SendInput
GetThreadDesktop
OpenInputDesktop
MessageBoxA
DeleteDC
GetDeviceCaps
CreateDCA
CreateCompatibleDC
DeleteObject
CreateCompatibleBitmap
GetDIBits
BitBlt
SelectObject
RegCreateKeyExA
LookupPrivilegeValueA
OpenProcessToken
ImpersonateSelf
OpenThreadToken
ChangeServiceConfigA
SetServiceStatus
RegisterServiceCtrlHandlerA
RegQueryValueExA
CreateServiceA
RegEnumValueA
RegEnumKeyExA
RegDeleteValueA
RegOpenKeyExA
RegSetValueExA
RegCloseKey
QueryServiceConfigA
EnumServicesStatusA
DeleteService
ControlService
StartServiceA
OpenSCManagerA
OpenServiceA
CloseServiceHandle
AdjustTokenPrivileges
SHEmptyRecycleBinA
ShellExecuteA
SHFileOperationA
CreateStreamOnHGlobal
connect
socket
bind
setsockopt
listen
accept
ntohs
getsockname
select
recv
send
WSASocketA
WSADuplicateSocketA
WSAStartup
inet_addr
gethostbyname
inet_ntoa
closesocket
htons
SHDeleteKeyA
StrCmpNIA
StrRChrA
StrStrA
StrCmpW
StrToIntA
StrChrA
EnumProcesses
GetModuleFileNameExA
InternetOpenA
InternetOpenUrlA
InternetCloseHandle
HttpQueryInfoA
InternetReadFile
ImmGetCompositionStringW
ImmGetCompositionStringA
ImmReleaseContext
ImmGetContext
_adjust_fdiv
_initterm
strstr
strchr
malloc
wcscmp
free
__CxxFrameHandler
_beginthread
??2@YAPAXI@Z
??3@YAXPAX@Z
capCreateCaptureWindowA
capGetDriverDescriptionA
GetLastError
lstrcmpA
FindNextFileA
FindFirstFileA
lstrcmpiA
GetCurrentProcessId
GetCurrentProcess
Process32Next
Process32First
CreateToolhelp32Snapshot
TerminateProcess
OpenProcess
DuplicateHandle
SetStdHandle
CreatePipe
GetStdHandle
CreateProcessA
DeviceIoControl
GetOEMCP
GetACP
GetComputerNameA
GlobalMemoryStatus
GetSystemInfo
GetVersionExA
GetVersion
QueryPerformanceCounter
GetDriveTypeA
lstrcpyA
MoveFileA
FindClose
LoadLibraryA
RaiseException
InterlockedExchange
LocalAlloc
FreeLibrary
GetProcAddress
CreateThread
GetFileAttributesA
ExitProcess
lstrlenW
WideCharToMultiByte
GetLocalTime
GetSystemDirectoryA
GetModuleFileNameA
GetStartupInfoA
CallNamedPipeA
OpenEventA
lstrcatA
CreateNamedPipeA
ConnectNamedPipe
FlushFileBuffers
WriteFile
GetTempPathA
SetPriorityClass
lstrlenA
GetFileSize
DeleteFileA
GlobalAlloc
GlobalLock
lstrcpyW
WaitForMultipleObjects
GetCurrentThreadId
DisconnectNamedPipe
SetFilePointer
GetPriorityClass
GetCurrentThread
GetThreadPriority
SetEvent
GetVolumeInformationA
GetDiskFreeSpaceExA
GetLogicalDriveStringsA
CreateDirectoryA
GetFileAttributesExA
Sleep
WaitForSingleObject
ResetEvent
ReleaseMutex
GlobalFree
CreateEventA
CreateMutexA
CreateFileA
GetFileSizeEx
SetFilePointerEx
ReadFile
CloseHandle
GetTickCount
QueryPerformanceFrequency
SetThreadPriority
DoMainWork
DoService
ServiceMain
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ