main
silenceMain
yaya
Static task
static1
Behavioral task
behavioral1
Sample
17a68c2593c65255392109379f18827b_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
17a68c2593c65255392109379f18827b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
.rsrc/0/BIN/DLL.dll
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
.rsrc/0/BIN/DLL.dll
Resource
win10v2004-20240802-en
Target
17a68c2593c65255392109379f18827b_JaffaCakes118
Size
504KB
MD5
17a68c2593c65255392109379f18827b
SHA1
89bc57a583b0a3151df991c5459937ab6c72037f
SHA256
d1d15fb47dd27782a490b8f7aac56ca713fca50603e54642f5ef4e2b1beb8b72
SHA512
5f2abc0316fae6d6463bc2e107a27eb3cd02cfdfaa8de6dbfe993595d41c04a5e9536a56ba0b2f172a35d424d77c33c40ed5ffab836ef1af76f8f35cfaff9812
SSDEEP
12288:UhOdYJFAgBv3r+TMP10fWdNHWWWF0eLLeM5ynFAJM:USaFAgBv3r+TMP106N2WW9LSM5yniJM
Checks for missing Authenticode signature.
resource |
---|
17a68c2593c65255392109379f18827b_JaffaCakes118 |
unpack001/.rsrc/0/BIN/DLL |
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetCurrentThreadId
GetCommandLineA
SetUnhandledExceptionFilter
GetModuleFileNameA
ExpandEnvironmentStringsA
lstrlenA
lstrcpyA
FindResourceA
LoadResource
LockResource
SizeofResource
ExitProcess
LoadLibraryA
lstrcatA
GetLastError
GetModuleHandleA
GetProcAddress
RaiseException
InterlockedExchange
LocalAlloc
FreeLibrary
GetStartupInfoA
CloseServiceHandle
OpenServiceA
StartServiceA
OpenSCManagerA
CreateServiceA
RegDeleteValueA
RegDeleteKeyA
RegCreateKeyExA
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
strchr
memset
fclose
fwrite
fopen
??2@YAPAXI@Z
memcpy
strstr
??3@YAXPAX@Z
??1type_info@@UAE@XZ
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_controlfp
_CxxThrowException
__CxxFrameHandler
strlen
_except_handler3
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
CreateEventA
CloseHandle
TerminateThread
WaitForSingleObject
SetEvent
ResumeThread
CreateThread
InitializeCriticalSection
DeleteCriticalSection
VirtualFree
LeaveCriticalSection
EnterCriticalSection
VirtualAlloc
ResetEvent
lstrcpyA
InterlockedExchange
CancelIo
Sleep
GetTickCount
GetProcAddress
LoadLibraryA
FreeLibrary
lstrlenA
GetPrivateProfileSectionNamesA
lstrcatA
GetWindowsDirectoryA
MultiByteToWideChar
WideCharToMultiByte
lstrcmpA
GetPrivateProfileStringA
GetVersionExA
DeleteFileA
GetLastError
CreateDirectoryA
GetDriveTypeA
GetDiskFreeSpaceExA
GetVolumeInformationA
FindClose
LocalFree
LocalReAlloc
LocalAlloc
RemoveDirectoryA
GetFileSize
CreateFileA
WriteFile
MoveFileA
GetModuleFileNameA
SetLastError
GetSystemDirectoryA
ExitProcess
GetCurrentProcess
GetVersion
DeviceIoControl
WriteProcessMemory
VirtualAllocEx
OpenProcess
MoveFileExA
GetLocalTime
ExpandEnvironmentStringsA
MapViewOfFile
CreateFileMappingA
HeapFree
GetProcessHeap
HeapAlloc
UnmapViewOfFile
GlobalFree
GlobalAlloc
GlobalSize
CreatePipe
WaitForMultipleObjects
GlobalMemoryStatusEx
GetSystemInfo
ReleaseMutex
OpenEventA
SetUnhandledExceptionFilter
Process32First
GetCurrentThreadId
RaiseException
strlen
strstr
strcat
strcmp
memcmp
_CxxThrowException
rand
putchar
strcpy
puts
sprintf
strncpy
strchr
malloc
free
_except_handler3
strrchr
_ftol
wcscpy
strncat
realloc
atol
wcstombs
_beginthreadex
calloc
_purecall
vsprintf
??1type_info@@UAE@XZ
ceil
memmove
__CxxFrameHandler
memcpy
??3@YAXPAX@Z
atoi
??2@YAPAXI@Z
memset
_strnicmp
_strnset
_strcmpi
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
SysFreeString
main
silenceMain
yaya
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ