Inse
_Inse@16
Static task
static1
Behavioral task
behavioral1
Sample
301c670250437b52b51d13081e895b11_JaffaCakes118.dll
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
301c670250437b52b51d13081e895b11_JaffaCakes118.dll
Resource
win10v2004-20241007-en
Target
301c670250437b52b51d13081e895b11_JaffaCakes118
Size
67KB
MD5
301c670250437b52b51d13081e895b11
SHA1
106312a994e174d6810af68a262cbd79c10ffa63
SHA256
c31a4f733c278a1a4369bd8ceda77cbd129c98d48f531262aaf628e8bc931149
SHA512
44b6e9cd0126517239e181d9229abda525ee9a46790454974e9d2a9b0c3076b85f0d4913644c56bd1f43eb1d0399de32fe5d9f45504c07ae801ed6b3677d108e
SSDEEP
768:nVHgzsvQ14re6wFobBO6qN4UxDNLuAX0:yp14twFobBO6QDt
Checks for missing Authenticode signature.
resource |
---|
301c670250437b52b51d13081e895b11_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
lstrcmpiA
lstrcatA
CloseHandle
GetCurrentProcess
Module32First
VirtualProtectEx
ReadFile
GetFileSize
GetPrivateProfileStringA
FindNextFileA
CreateMutexA
DeleteFileA
GetModuleFileNameA
CopyFileA
TerminateProcess
GlobalFree
GlobalUnlock
DisableThreadLibraryCalls
FindClose
VirtualAllocEx
VirtualFreeEx
GetLastError
ReleaseMutex
lstrlenW
WideCharToMultiByte
MultiByteToWideChar
CreateFileA
InitializeCriticalSection
GetTempPathA
GetModuleHandleA
GetCurrentProcessId
WaitForSingleObject
Sleep
LoadLibraryA
GetProcAddress
WinExec
lstrcpyA
lstrlenA
GetTickCount
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
OpenWindowStationA
GetDC
ReleaseDC
SetProcessWindowStation
OpenDesktopA
SetThreadDesktop
wsprintfA
GetWindowRect
GetForegroundWindow
GetWindowThreadProcessId
GetNearestPaletteIndex
DeleteObject
CreateHalftonePalette
GetPaletteEntries
LookupPrivilegeValueA
SetSecurityDescriptorDacl
OpenProcessToken
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ID@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
getpeername
gethostbyname
WSAStartup
closesocket
send
recv
select
connect
ioctlsocket
htons
socket
strlen
sscanf
free
sprintf
strchr
strtok
wcscmp
_splitpath
_purecall
__dllonexit
_onexit
malloc
strcpy
fflush
fopen
fwrite
fputc
fclose
strstr
_beginthreadex
strcmp
atoi
_itoa
memset
memcpy
__CxxFrameHandler
??2@YAPAXI@Z
strcat
strrchr
StrStrIA
MakeSureDirectoryPathExists
Inse
_Inse@16
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ