Install
_Install@16
Static task
static1
Behavioral task
behavioral1
Sample
3d4b42fbaaa21181cda577d3f87aa640_JaffaCakes118.dll
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
3d4b42fbaaa21181cda577d3f87aa640_JaffaCakes118.dll
Resource
win10v2004-20241007-en
Target
3d4b42fbaaa21181cda577d3f87aa640_JaffaCakes118
Size
64KB
MD5
3d4b42fbaaa21181cda577d3f87aa640
SHA1
3c6279fdc9e160f59cdb7d2d384e9b54c262b139
SHA256
c5d59ee2827af7990e8295698b45b082a2d3c3be7aa5ed44c2b91f738931eb15
SHA512
b4a82f4e645d065e377e3e543c07ad2c734cf4c383238c505fa3b6629365a914b49bad7992a262b04168560d21db1584055d4049a52b3ac0539f7b15aca3b833
SSDEEP
768:v8IwhSKjSEfeXO86sOFiWwSF0DN4OxT6SSpfk9N7:QSZKeXQsOcnTypMv7
Checks for missing Authenticode signature.
resource |
---|
3d4b42fbaaa21181cda577d3f87aa640_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
VirtualFreeEx
VirtualAllocEx
FindClose
FindNextFileA
lstrcmpiA
lstrcatA
GetCurrentProcess
Module32First
VirtualProtectEx
GetModuleHandleA
ReleaseMutex
CreateMutexA
DeleteFileA
GetModuleFileNameA
CopyFileA
TerminateProcess
GlobalFree
GlobalUnlock
IsBadReadPtr
InitializeCriticalSection
GetTempPathA
CreateFileA
ReadFile
GetLastError
CloseHandle
GetCurrentProcessId
DisableThreadLibraryCalls
WaitForSingleObject
Sleep
LoadLibraryA
GetProcAddress
WinExec
lstrcpyA
lstrlenA
GetTickCount
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
wsprintfA
GetWindowThreadProcessId
EnumWindows
SetThreadDesktop
OpenWindowStationA
ReleaseDC
GetDC
GetWindowTextA
GetForegroundWindow
GetWindowRect
OpenDesktopA
GetNearestPaletteIndex
DeleteObject
CreateHalftonePalette
GetPaletteEntries
SetSecurityDescriptorDacl
OpenProcessToken
LookupPrivilegeValueA
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ID@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
getpeername
WSAStartup
closesocket
send
recv
select
connect
ioctlsocket
htons
socket
gethostbyname
fopen
fflush
fclose
strncpy
sprintf
strlen
free
malloc
strstr
fwrite
fputc
_beginthreadex
atoi
memcmp
_onexit
__dllonexit
_purecall
_splitpath
wcscmp
strchr
isprint
memset
memcpy
__CxxFrameHandler
??2@YAPAXI@Z
strcat
strrchr
strcpy
sscanf
StrStrIA
MakeSureDirectoryPathExists
Install
_Install@16
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ