Entry
GetCfg
InfectFile
Init
InstallHook
ResetSSDT
UnHook
Uninstall
_EventLogon@4
_EventStartup@4
Static task
static1
Behavioral task
behavioral1
Sample
26cc96f633b5d0d3eb1ead3613df5f50_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
26cc96f633b5d0d3eb1ead3613df5f50_JaffaCakes118.dll
Resource
win10v2004-20241007-en
Target
26cc96f633b5d0d3eb1ead3613df5f50_JaffaCakes118
Size
64KB
MD5
26cc96f633b5d0d3eb1ead3613df5f50
SHA1
3b6b8535664b2fae77796179895de060a25083ae
SHA256
d2252542eeba77893f0fd1c059bd5f749798f3dfe5ee44f93ab6fd700a797094
SHA512
47bce02cb92c034fb1e592c347065abb735de5c82304ecab9f07c2daac12f017ec04c56ba50f88f140d0fdc20f3404f757dcc01837872aac0228f0e3d8666627
SSDEEP
768:woDrUdTcdjh4Hf+6QA6vJjhVk+3DLEYcSsrYWyyxrVeIQGRK+HEluoji53i9GSV8:wzdTkN4/1FEVkEySmFVeEKxLSiQSW
Checks for missing Authenticode signature.
resource |
---|
26cc96f633b5d0d3eb1ead3613df5f50_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
strtok
strcmp
strcat
memcpy
tolower
wcslen
wcscpy
malloc
free
_except_handler3
_strupr
exit
fputc
fwrite
memcmp
fread
fseek
__CxxFrameHandler
_initterm
_adjust_fdiv
_strrev
_strnicmp
strstr
memset
strcspn
strncpy
strcpy
atoi
_vsnprintf
sprintf
fopen
fputs
fclose
strlen
_wcsicmp
GetProcAddress
LoadLibraryA
HeapAlloc
GetProcessHeap
HeapFree
CloseHandle
Process32Next
Process32First
CreateToolhelp32Snapshot
SetFileTime
GetFileTime
CreateFileA
FindClose
FindFirstFileA
SetLastError
FormatMessageA
LocalFree
GetLocalTime
FreeResource
WriteFile
LockResource
LoadResource
SizeofResource
FindResourceA
GetCurrentProcess
CreateProcessA
lstrlenA
OpenProcess
GetVersion
DeleteFileA
GetLongPathNameA
GetTempPathA
GetSystemDirectoryA
GetDriveTypeA
FindNextFileA
MoveFileExA
SetFileAttributesA
CreateDirectoryA
RemoveDirectoryA
MultiByteToWideChar
GetACP
FreeLibrary
FileTimeToSystemTime
FileTimeToLocalFileTime
VirtualQueryEx
ReadProcessMemory
GetSystemInfo
VirtualProtectEx
GetTickCount
CreateThread
GetModuleHandleA
GlobalFree
SetFilePointer
lstrcatA
GlobalAlloc
lstrlenW
ReleaseMutex
CopyFileA
GetSystemWindowsDirectoryA
VirtualAlloc
ReadFile
GetFileSize
VirtualFree
VirtualFreeEx
WriteProcessMemory
VirtualAllocEx
TerminateProcess
GlobalReAlloc
GlobalLock
GlobalSize
GlobalMemoryStatus
GlobalUnlock
GetEnvironmentVariableA
GetStartupInfoA
CreatePipe
GetCurrentDirectoryA
DeviceIoControl
LoadLibraryExA
OpenMutexA
TerminateThread
GetVersionExA
GetModuleFileNameA
GetCurrentThreadId
WideCharToMultiByte
WaitForSingleObject
GetLastError
Sleep
GetCurrentProcessId
VirtualProtect
GetDesktopWindow
FindWindowA
SetThreadDesktop
CloseWindowStation
OpenDesktopA
SetProcessWindowStation
OpenWindowStationA
GetThreadDesktop
GetProcessWindowStation
ExitWindowsEx
LockWorkStation
ShowCursor
ClipCursor
SetWindowPos
ShowWindow
IsRectEmpty
SendMessageA
IsWindow
DefWindowProcA
SetTimer
PostQuitMessage
KillTimer
DispatchMessageA
TranslateMessage
GetMessageA
CreateWindowExA
RegisterClassA
LoadCursorA
LoadIconA
CallNextHookEx
GetWindowTextA
GetWindowDC
GetDC
ReleaseDC
mouse_event
SetCursorPos
UnhookWindowsHookEx
EnableWindow
wsprintfW
MessageBoxA
GetSystemMetrics
wsprintfA
SetWindowsHookExA
GetActiveWindow
CreateCompatibleDC
CreateDCA
GetDIBits
RealizePalette
GetDeviceCaps
CreateCompatibleBitmap
SelectPalette
GetObjectA
GetStockObject
DeleteObject
StretchBlt
DeleteDC
SelectObject
RegOpenKeyExA
LookupPrivilegeValueA
OpenProcessToken
DeleteService
ControlService
QueryServiceStatus
CloseServiceHandle
OpenServiceA
OpenSCManagerA
CloseEventLog
ClearEventLogA
OpenEventLogA
LsaNtStatusToWinError
LsaClose
RegOpenKeyA
StartServiceA
GetUserNameA
RegQueryValueExA
RegCreateKeyA
AdjustTokenPrivileges
RegSetValueExA
RegCloseKey
GetTokenInformation
LookupAccountSidA
LsaOpenPolicy
LsaRetrievePrivateData
ShellExecuteA
gethostname
gethostbyname
getsockopt
socket
ioctlsocket
bind
listen
select
recv
inet_addr
setsockopt
connect
send
htons
closesocket
WSAStartup
WSACleanup
SfcIsFileProtected
EnumProcessModules
GetModuleFileNameExA
URLDownloadToFileA
GetUrlCacheEntryInfoA
ImmReleaseContext
ImmGetContext
ImmGetCompositionStringA
capCreateCaptureWindowA
capGetDriverDescriptionA
Entry
GetCfg
InfectFile
Init
InstallHook
ResetSSDT
UnHook
Uninstall
_EventLogon@4
_EventStartup@4
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ