ControlPanel
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Rundll32
Static task
static1
Behavioral task
behavioral1
Sample
17989586b413f2c3ec6e30d97decfaed_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
17989586b413f2c3ec6e30d97decfaed_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
17989586b413f2c3ec6e30d97decfaed_JaffaCakes118
Size
248KB
MD5
17989586b413f2c3ec6e30d97decfaed
SHA1
9179aa24ea2df167b7044ee08a3128dad7c6b163
SHA256
794130424a0fb0d36784775c854f38faca2da153c9f02f53b0c7d955af4470ea
SHA512
643b83ea45ba77bff66747c0a7f7f37cea4c618693275915c077603b20746168470355b12673ee0e1e2a66447b5e56b64c8dcf827abdc51555b22c8a3dc6e499
SSDEEP
6144:7qlwQwuOckb0o28v+XH8sBQpM8ExhYRGS:78olp9
Checks for missing Authenticode signature.
resource |
---|
17989586b413f2c3ec6e30d97decfaed_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
ImageDirectoryEntryToData
InterlockedIncrement
EnterCriticalSection
HeapDestroy
GetCurrentThreadId
FlushInstructionCache
Sleep
GetEnvironmentVariableA
GetWindowsDirectoryA
CopyFileA
IsBadCodePtr
TerminateThread
GetSystemDefaultLangID
CreateRemoteThread
WriteProcessMemory
VirtualAllocEx
SetLastError
LeaveCriticalSection
FindNextFileA
FindFirstFileA
WriteFile
GetVolumeInformationA
Module32Next
GetLocalTime
SetErrorMode
VirtualFreeEx
GetExitCodeThread
LocalFree
WinExec
GetCommandLineA
CreateDirectoryA
RemoveDirectoryA
MoveFileExA
LocalAlloc
DeleteCriticalSection
InitializeCriticalSection
IsDBCSLeadByte
lstrcpynA
lstrcmpiA
LoadLibraryExA
GetTempFileNameA
GetACP
GetCurrentProcessId
InterlockedExchange
WritePrivateProfileStringA
lstrlenA
InterlockedDecrement
FindResourceA
LoadResource
SizeofResource
lstrcpyA
lstrcatA
lstrlenW
WideCharToMultiByte
MultiByteToWideChar
ReleaseMutex
GetSystemDirectoryA
GetTempPathA
DeviceIoControl
GetTickCount
GetPrivateProfileSectionA
GetPrivateProfileStringA
WaitForSingleObject
CreateMutexA
GetShortPathNameA
IsBadWritePtr
GetModuleHandleA
IsBadReadPtr
VirtualProtect
VirtualQuery
GetModuleFileNameA
LoadLibraryA
GetProcAddress
GetVersionExA
Process32Next
FreeLibrary
GetCurrentThread
GetLastError
GetCurrentProcess
OpenProcess
TerminateProcess
CreateFileA
GetFileSize
SetFilePointer
ReadFile
CloseHandle
DeleteFileA
RaiseException
FindClose
UpdateWindow
SetCursor
SetCapture
ReleaseCapture
IsWindowVisible
SystemParametersInfoA
GetSysColor
DrawEdge
InflateRect
SetWindowLongW
DrawTextA
SetRect
FillRect
PeekMessageA
GetMessageA
TranslateMessage
DispatchMessageA
SendMessageA
DefWindowProcW
CallWindowProcW
GetKeyState
SetPropA
ReplyMessage
InSendMessage
CharUpperA
CharLowerA
CopyRect
PtInRect
GetPropA
RemovePropA
GetWindowThreadProcessId
IsWindowUnicode
GetWindowTextLengthW
GetWindowTextW
SetWindowTextA
GetWindowTextLengthA
IsWindowEnabled
CallNextHookEx
SetWindowsHookExA
UnhookWindowsHookEx
UnregisterClassA
CharUpperBuffA
GetDesktopWindow
GetMenu
GetClientRect
GetDC
ReleaseDC
InvalidateRect
IntersectRect
EqualRect
OffsetRect
SetWindowRgn
SetWindowPos
IsWindow
GetParent
SetFocus
GetFocus
IsChild
DestroyWindow
GetClassInfoExA
LoadCursorA
wsprintfA
RegisterClassExA
CreateWindowExA
CallWindowProcA
GetWindowLongA
DefWindowProcA
CharNextA
GetForegroundWindow
DialogBoxParamA
MessageBoxA
IsDlgButtonChecked
EndDialog
BeginPaint
EndPaint
LoadIconA
DrawIcon
GetSystemMetrics
SetForegroundWindow
ShowWindow
PostMessageA
LoadStringA
SetTimer
KillTimer
GetAncestor
GetClassNameA
GetWindowTextA
SetWindowLongA
GetTextMetricsA
GetStockObject
CreatePen
MoveToEx
CreateRectRgnIndirect
RestoreDC
DeleteDC
SetViewportOrgEx
SetWindowOrgEx
SetMapMode
SaveDC
LPtoDP
GetDeviceCaps
CreateDCA
DeleteObject
SelectObject
SetTextColor
SetBkMode
Rectangle
CreateSolidBrush
LineTo
RegSetValueA
RegQueryValueA
RegCreateKeyA
RegFlushKey
ControlService
StartServiceA
OpenServiceA
DeleteService
CreateServiceA
RegOpenKeyA
RegEnumKeyA
RegQueryInfoKeyA
RegSetValueExA
RegEnumKeyExA
RegDeleteValueA
RegCreateKeyExA
RegDeleteKeyA
CloseServiceHandle
OpenSCManagerA
RegEnumValueA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
OpenThreadToken
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
SHDeleteKeyA
SHSetValueA
SHGetValueA
SHDeleteValueA
PathFindFileNameA
StrStrIA
SHDeleteEmptyKeyA
memset
strcpy
strlen
strcat
__CxxFrameHandler
fopen
fprintf
fclose
??3@YAXPAX@Z
_beginthreadex
??2@YAPAXI@Z
sscanf
sprintf
atoi
strtok
_strnicmp
strcmp
strrchr
strncpy
_snprintf
malloc
strstr
free
_except_handler3
time
fwrite
isalnum
memcpy
wcscpy
_mbspbrk
strchr
memmove
memcmp
strncmp
_stricmp
realloc
_purecall
atol
fgets
fseek
_mbsnbcpy
abs
_ftol
_strlwr
strncat
_mbsrchr
_mbsstr
rewind
__dllonexit
_onexit
?terminate@@YAXXZ
_initterm
_adjust_fdiv
Netbios
ControlPanel
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Rundll32
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ