COMResModuleInstance
DriverProc
KsCreateAllocator
KsCreatePin
KsCreateTopologyNode
ServerMain
modMessage
modmCallback
Static task
static1
Behavioral task
behavioral1
Sample
2c0ebd381d57597a4ddd606c81f5c30b_JaffaCakes118.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
2c0ebd381d57597a4ddd606c81f5c30b_JaffaCakes118.dll
Resource
win10v2004-20241007-en
Target
2c0ebd381d57597a4ddd606c81f5c30b_JaffaCakes118
Size
35KB
MD5
2c0ebd381d57597a4ddd606c81f5c30b
SHA1
2d27d141f6f065c7f82e8bfad6028084c61fe133
SHA256
f586ea7a45e96b72de475bc0f655b1bd1dd5ede5bb86a597e055241d5e07a92d
SHA512
cc8c18ed9825424dd9a4558b691324b41978f7b409c9fa5bfbbcc55851ef73689f4b89578fb4ad875887e86504de1eb2454575092d07115832e80d50bdcf3a50
SSDEEP
768:F2ZiVCbNRXDVEsWXMfI7c70YUOChwLb90RAlT:Fc2gNRNW8570YK6N0RAlT
Checks for missing Authenticode signature.
resource |
---|
2c0ebd381d57597a4ddd606c81f5c30b_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
CreateEventA
GetModuleFileNameA
GetTempPathA
GetWindowsDirectoryA
CreateToolhelp32Snapshot
GetLastError
TerminateProcess
OpenProcess
SetFileAttributesA
GetCommandLineA
SetFilePointer
GetFileSize
ReadFile
WaitForSingleObject
GetSystemDirectoryA
MultiByteToWideChar
DeleteFileA
GlobalLock
CreateFileA
WriteFile
GlobalUnlock
GlobalFree
CloseHandle
LoadLibraryA
GetProcAddress
GlobalAlloc
VirtualProtect
ExitProcess
CreateThread
IsBadReadPtr
Sleep
SetWindowLongA
RegisterShellHookWindow
RegisterWindowMessageA
EnumWindows
GetClassNameA
wsprintfA
GetClientRect
GetDesktopWindow
GetDC
GetWindowRect
GetParent
GetWindowThreadProcessId
ReleaseDC
GetWindowTextA
CallWindowProcA
BitBlt
SelectObject
CreateCompatibleBitmap
CreateCompatibleDC
GetDIBits
RealizePalette
SelectPalette
GetStockObject
GetObjectA
DeleteDC
GetDeviceCaps
CreateDCA
DeleteObject
CryptGetHashParam
CryptHashData
CryptCreateHash
CryptAcquireContextA
GdiplusShutdown
GdipDisposeImage
GdiplusStartup
GdipGetImageEncoders
GdipGetImageEncodersSize
GdipFree
GdipAlloc
GdipCloneImage
GdipLoadImageFromFile
GdipSaveImageToFile
??1_Lockit@std@@QAE@XZ
??0_Lockit@std@@QAE@XZ
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??0Init@ios_base@std@@QAE@XZ
??1Init@ios_base@std@@QAE@XZ
??0_Winit@std@@QAE@XZ
??1_Winit@std@@QAE@XZ
connect
htons
gethostbyname
socket
recv
send
inet_ntoa
WSAStartup
WSACleanup
inet_addr
closesocket
InternetReadFile
InternetOpenUrlA
InternetOpenA
InternetCloseHandle
strrchr
_access
strcat
strchr
atoi
abs
malloc
wcscmp
free
__dllonexit
_onexit
_initterm
_adjust_fdiv
_getpid
_stricmp
_strlwr
_strrev
??2@YAPAXI@Z
memcpy
__CxxFrameHandler
strncmp
strstr
memset
sprintf
strncpy
strcmp
strcpy
strlen
Netbios
COMResModuleInstance
DriverProc
KsCreateAllocator
KsCreatePin
KsCreateTopologyNode
ServerMain
modMessage
modmCallback
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ