Install
_Install@16
Static task
static1
Behavioral task
behavioral1
Sample
2adca156acfc20313e285e5ea00ecd22_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2adca156acfc20313e285e5ea00ecd22_JaffaCakes118.dll
Resource
win10v2004-20241007-en
Target
2adca156acfc20313e285e5ea00ecd22_JaffaCakes118
Size
67KB
MD5
2adca156acfc20313e285e5ea00ecd22
SHA1
090414b3c43a4e5d8cc6f983a02c27e98544d405
SHA256
bafde389a0fc7cc1738c708b755c9bf6e0bb441b4b2380d2682e025e323e9108
SHA512
423c626867f399223621bf2bc87e1db7ab3968d850fca727bdd68f04f6812294c10a510818737438b25e2a444b3b1e3ae5e44a97b21a1884b86189a47fda5854
SSDEEP
768:wbDgPY1Q7/PY64VRs5n6KN4UxPqOppRztDX0:F77/j4VRs5n6wP/ppBt
Checks for missing Authenticode signature.
resource |
---|
2adca156acfc20313e285e5ea00ecd22_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
VirtualFreeEx
VirtualAllocEx
FindClose
FindNextFileA
lstrcmpiA
lstrcatA
GetCurrentProcess
Module32First
VirtualProtectEx
GetPrivateProfileStringA
ReleaseMutex
CreateMutexA
DeleteFileA
GetModuleFileNameA
CopyFileA
TerminateProcess
GlobalFree
GlobalUnlock
DisableThreadLibraryCalls
lstrlenW
WideCharToMultiByte
MultiByteToWideChar
InitializeCriticalSection
GetTempPathA
GetModuleHandleA
CreateFileA
GetFileSize
ReadFile
GetLastError
CloseHandle
GetCurrentProcessId
WaitForSingleObject
Sleep
LoadLibraryA
GetProcAddress
WinExec
lstrcpyA
lstrlenA
GetTickCount
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
GetDC
ReleaseDC
OpenWindowStationA
SetProcessWindowStation
OpenDesktopA
SetThreadDesktop
wsprintfA
GetWindowRect
GetForegroundWindow
GetWindowThreadProcessId
GetNearestPaletteIndex
DeleteObject
CreateHalftonePalette
GetPaletteEntries
SetSecurityDescriptorDacl
OpenProcessToken
LookupPrivilegeValueA
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ID@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
htons
ioctlsocket
connect
select
recv
send
getpeername
closesocket
WSAStartup
gethostbyname
socket
malloc
free
sscanf
strchr
strtok
wcscmp
_splitpath
_purecall
__dllonexit
_onexit
fwrite
strlen
sprintf
fflush
fopen
_itoa
fputc
fclose
strstr
_beginthreadex
strcmp
memset
memcpy
__CxxFrameHandler
??2@YAPAXI@Z
strcat
strrchr
strcpy
atoi
StrStrIA
MakeSureDirectoryPathExists
Install
_Install@16
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ