DelSer
ServiceMain
Setup
Static task
static1
Behavioral task
behavioral1
Sample
113df445f1d941925906d24bf3a25543_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
113df445f1d941925906d24bf3a25543_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
113df445f1d941925906d24bf3a25543_JaffaCakes118
Size
162KB
MD5
113df445f1d941925906d24bf3a25543
SHA1
8909bd97d9c205859effa8be06233f657dc12b9f
SHA256
8dc60f6b7aab30a31094c2f7ba2f24f5029c3ac5141224115deaa5577e4e34d8
SHA512
6ff1a958b77dc59c7754cee981e362568007e601cecba892d2ffe18d57e449621313642a4bce1008b477ee06d3c8a1d485a136972d01a278c3cdf7212542044e
SSDEEP
3072:N7b8wOK0hp+EwBuanBjjWIrgO1HNNRVEb/T0jiJSqbLzVtzhD1zCCKds:N7boKipy1nB3WIrgO1tNRVEb/TbcILtz
Checks for missing Authenticode signature.
resource |
---|
113df445f1d941925906d24bf3a25543_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
SysFreeString
SysReAllocStringLen
SysAllocStringLen
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
GetKeyboardType
DestroyWindow
MessageBoxA
CharNextA
CreateWindowExA
mouse_event
keybd_event
WindowFromPoint
UnregisterClassA
TranslateMessage
ShowWindow
SetThreadDesktop
SetProcessWindowStation
SetCursorPos
SetCapture
SendMessageA
ReleaseDC
RegisterClassA
PeekMessageA
OpenWindowStationA
OpenInputDesktop
OpenClipboard
MsgWaitForMultipleObjects
MessageBoxA
IsWindowVisible
IsClipboardFormatAvailable
GetWindowThreadProcessId
GetWindowTextA
GetThreadDesktop
GetSystemMetrics
GetSysColor
GetProcessWindowStation
GetWindow
GetDC
GetClipboardData
GetClassInfoA
FindWindowA
FillRect
EnableWindow
DispatchMessageA
DestroyWindow
DefWindowProcA
CopyImage
CloseWindowStation
CloseDesktop
CloseClipboard
CharUpperBuffA
GetACP
Sleep
VirtualFree
VirtualAlloc
GetCurrentThreadId
VirtualQuery
SetCurrentDirectoryA
MultiByteToWideChar
GetStartupInfoA
GetModuleFileNameA
GetLastError
GetCommandLineA
FreeLibrary
ExitProcess
ExitThread
CreateThread
WriteFile
UnhandledExceptionFilter
SetFilePointer
SetEndOfFile
RtlUnwind
ReadFile
RaiseException
GetStdHandle
GetFileSize
GetFileType
CreateFileA
CloseHandle
TlsSetValue
TlsGetValue
TlsFree
TlsAlloc
LocalFree
LocalAlloc
WriteProcessMemory
WriteFile
WinExec
WaitForSingleObject
VirtualFreeEx
VirtualAllocEx
TerminateThread
TerminateProcess
SystemTimeToFileTime
SuspendThread
Sleep
SizeofResource
SetThreadPriority
SetPriorityClass
SetFilePointer
SetFileAttributesA
SetCurrentDirectoryA
ResumeThread
RemoveDirectoryA
ReadFile
QueryPerformanceCounter
OpenProcess
OpenMutexA
MoveFileA
LockResource
LoadResource
LoadLibraryA
LeaveCriticalSection
InitializeCriticalSection
GlobalUnlock
GlobalReAlloc
GlobalMemoryStatus
GlobalHandle
GlobalLock
GlobalFree
GlobalAlloc
GetWindowsDirectoryA
GetVersionExA
GetTimeFormatA
GetTickCount
GetThreadPriority
GetSystemDirectoryA
GetStdHandle
GetStartupInfoA
GetProcAddress
GetPriorityClass
GetModuleHandleA
GetModuleFileNameA
GetLocalTime
GetLastError
GetFileAttributesA
GetExitCodeThread
GetExitCodeProcess
GetDriveTypeA
GetDateFormatA
GetCurrentThreadId
GetCurrentThread
GetCurrentProcess
GetCurrentDirectoryA
GetComputerNameA
InterlockedIncrement
InterlockedDecrement
FreeLibrary
FreeConsole
FindResourceA
FindNextFileA
FindFirstFileA
FindClose
FileTimeToSystemTime
FileTimeToLocalFileTime
FileTimeToDosDateTime
ExpandEnvironmentStringsA
ExitThread
EnterCriticalSection
DeleteFileA
DeleteCriticalSection
CreateThread
CreateRemoteThread
CreateProcessA
CreatePipe
CreateMutexA
CreateFileA
CreateDirectoryA
CopyFileA
CompareStringA
CloseHandle
StretchDIBits
SetDIBits
SelectObject
GetObjectA
GetDIBits
GdiFlush
DeleteObject
DeleteDC
CreateSolidBrush
CreateDIBSection
CreateCompatibleDC
CreateCompatibleBitmap
CreateBrushIndirect
BitBlt
SHGetSpecialFolderPathA
DelSer
ServiceMain
Setup
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ