Eternal
Go
Heart
On
ServiceMain
StartMe
Static task
static1
Behavioral task
behavioral1
Sample
f0319b052ed452cc1f5b8ac3f182500d_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
f0319b052ed452cc1f5b8ac3f182500d_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
f0319b052ed452cc1f5b8ac3f182500d_JaffaCakes118
Size
80KB
MD5
f0319b052ed452cc1f5b8ac3f182500d
SHA1
22552cd4df855e15bd5567411a3b537b55ced287
SHA256
19a4487493bb7b1b6163945b3973b71aa032ce7c289e04ff0c71ee33fd7be1e0
SHA512
cbedfd64214b24e2c3b7cff7b78e10f6ef6f5a8bb680072b78153fe5d2c4dd7daf37278a1b503aedc19650a172abc77d1767437a7101459eb58100dc99878d48
SSDEEP
1536:+rDdTpI4w/O1cltGCmR7guhgHRd3oKc+v+fzHK76aLkfJpVB/n:+rDdTpI403ltGCYMfHRd3oKVv4zHKTLW
Checks for missing Authenticode signature.
resource |
---|
f0319b052ed452cc1f5b8ac3f182500d_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
SHDeleteKeyA
??3@YAXPAX@Z
memmove
_strnset
_strrev
_strnicmp
_strcmpi
_adjust_fdiv
_initterm
??1type_info@@UAE@XZ
calloc
_beginthreadex
wcstombs
atoi
realloc
strchr
strncat
strtok
strncpy
strrchr
_except_handler3
malloc
free
??2@YAPAXI@Z
__CxxFrameHandler
strstr
_ftol
ceil
lstrlenA
lstrcatA
GetDriveTypeA
FindClose
LocalFree
FindNextFileA
LocalReAlloc
FindFirstFileA
LocalAlloc
RemoveDirectoryA
GetFileSize
CreateFileA
GetProcAddress
SetFilePointer
WriteFile
Sleep
GetModuleFileNameA
SetLastError
GetCurrentProcess
GetWindowsDirectoryA
TerminateThread
GetVersionExA
CreateEventA
GetLocalTime
WaitForSingleObject
GlobalFree
CreateDirectoryA
GlobalLock
GlobalAlloc
GlobalSize
GlobalMemoryStatusEx
GetSystemInfo
ReleaseMutex
OpenEventA
SetErrorMode
CreateMutexA
SetUnhandledExceptionFilter
FreeConsole
lstrcmpiA
Process32First
GetCurrentThreadId
FreeLibrary
VirtualAlloc
EnterCriticalSection
LeaveCriticalSection
VirtualFree
DeleteCriticalSection
InitializeCriticalSection
GetLastError
DeleteFileA
lstrcpyA
CancelIo
InterlockedExchange
SetEvent
CloseHandle
GlobalUnlock
LoadLibraryA
ReadFile
RaiseException
PostMessageA
OpenDesktopA
GetThreadDesktop
GetUserObjectInformationA
OpenInputDesktop
SetThreadDesktop
CloseDesktop
GetProcessWindowStation
OpenWindowStationA
SetProcessWindowStation
GetCursorPos
GetCursorInfo
ReleaseDC
GetDesktopWindow
GetDC
SetRect
GetSystemMetrics
GetClipboardData
wsprintfA
MessageBoxA
LoadCursorA
DestroyCursor
BlockInput
SystemParametersInfoA
keybd_event
MapVirtualKeyA
SetCapture
mouse_event
WindowFromPoint
OpenClipboard
EmptyClipboard
SetClipboardData
CloseClipboard
SetCursorPos
GetDIBits
BitBlt
DeleteDC
DeleteObject
CreateCompatibleDC
CreateDIBSection
SelectObject
CreateCompatibleBitmap
OpenProcessToken
LookupPrivilegeValueA
DuplicateTokenEx
SetTokenInformation
AdjustTokenPrivileges
CreateProcessAsUserA
RegCreateKeyExA
RegOpenKeyA
RegQueryValueExA
RegSetValueExA
OpenServiceA
QueryServiceStatus
DeleteService
RegOpenKeyExA
RegCloseKey
SetServiceStatus
RegisterServiceCtrlHandlerA
RegDeleteKeyA
RegDeleteValueA
RegEnumKeyExA
RegEnumValueA
SHGetFileInfoA
connect
WSAStartup
gethostbyname
socket
select
closesocket
send
gethostname
htons
getsockname
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?_Xran@std@@YAXXZ
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?_Refcnt@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEAAEPBD@Z
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
WTSQueryUserToken
CreateEnvironmentBlock
InternetOpenA
InternetReadFile
InternetCloseHandle
InternetOpenUrlA
Eternal
Go
Heart
On
ServiceMain
StartMe
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ