InstallService
RundllInstall
RundllUninstall
ServiceMain
UninstallService
Static task
static1
Behavioral task
behavioral1
Sample
443e5e01708fe94f3f371d0040eb3bb6_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
443e5e01708fe94f3f371d0040eb3bb6_JaffaCakes118.dll
Resource
win10v2004-20241007-en
Target
443e5e01708fe94f3f371d0040eb3bb6_JaffaCakes118
Size
333KB
MD5
443e5e01708fe94f3f371d0040eb3bb6
SHA1
0f4430cb95c93467dae2af7fc912ee4a78359abd
SHA256
aec06d7fab54b3ace1617aaeba0344de0516a75604b317a0acafe2d919a97ac8
SHA512
c8a2577f971fc4a51fb6405678b4dd09b57c14a733214d023a09ee5ab45aa9076fed0c8df1c74b5ce016f4444b0aa2c4351db054ea4dc110026465bbcc08fe0c
SSDEEP
6144:bOfhsXdfgmwJXylUS82uIWwMJNT8iLuSKe+tmoY6OdTBaLgWJpDmm:bOZsBhJm20FYiOltmoydTigoVT
Checks for missing Authenticode signature.
resource |
---|
443e5e01708fe94f3f371d0040eb3bb6_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
WSAStartup
gethostbyname
SetServiceStatus
FreeSid
SetSecurityDescriptorDacl
CreateProcessAsUserA
OpenServiceA
CloseServiceHandle
OpenProcessToken
DeleteService
RegSetValueExA
RegisterServiceCtrlHandlerA
RegQueryValueExA
CreateServiceA
RegCreateKeyA
StartServiceA
RegOpenKeyExA
QueryServiceStatus
OpenSCManagerA
ControlService
RegOpenKeyA
RegCloseKey
RegEnumKeyA
RegCreateKeyExA
RegDeleteKeyA
RegDeleteValueA
LookupPrivilegeValueA
AdjustTokenPrivileges
InitializeSecurityDescriptor
AllocateAndInitializeSid
GetLengthSid
InitializeAcl
AddAccessAllowedAce
PostQuitMessage
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
DestroyMenu
CharUpperA
CharLowerBuffW
RegisterWindowMessageA
LoadIconA
WinHelpA
GetCapture
GetClassLongA
SetPropA
GetPropA
RemovePropA
IsWindow
GetForegroundWindow
GetDlgItem
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetForegroundWindow
GetClientRect
GetMenu
PostMessageA
CreateWindowExA
GetSubMenu
GetMenuItemCount
GetMenuItemID
GetMenuState
MessageBoxA
EnableWindow
IsWindowEnabled
GetLastActivePopup
GetWindowLongA
GetParent
SendMessageA
GetWindowThreadProcessId
UnhookWindowsHookEx
GetSystemMetrics
GetSysColorBrush
GetSysColor
ReleaseDC
GetDC
LoadCursorA
ValidateRect
PeekMessageA
GetKeyState
DispatchMessageA
CallNextHookEx
SetWindowsHookExA
UnregisterClassA
GetWindowTextA
SetWindowTextA
PtInRect
GetClassNameA
GetWindowRect
GetDlgCtrlID
GetWindow
ClientToScreen
GetFocus
CheckMenuItem
EnableMenuItem
ModifyMenuA
LoadBitmapA
GetMenuCheckMarkDimensions
SetMenuItemBitmaps
GetWindowPlacement
IsIconic
SystemParametersInfoA
SetWindowPos
SetWindowLongA
CallWindowProcA
DefWindowProcA
CopyRect
AdjustWindowRectEx
RegisterClassA
GetClassInfoA
GetClassInfoExA
EnumProcessModules
EnumProcesses
GetModuleBaseNameW
GlobalLock
GlobalAlloc
GlobalFree
TlsGetValue
GlobalReAlloc
GlobalHandle
TlsAlloc
TlsSetValue
LocalReAlloc
TlsFree
GetProcAddress
GetModuleHandleA
InterlockedDecrement
FindClose
FindFirstFileA
GetFileAttributesA
GetFileSize
ReadFile
WriteFile
SetFilePointer
FlushFileBuffers
LockFile
UnlockFile
SetEndOfFile
GetThreadLocale
DuplicateHandle
GlobalUnlock
GetFullPathNameA
InterlockedIncrement
GlobalGetAtomNameA
lstrcmpA
GlobalFlags
lstrcmpW
GlobalDeleteAtom
GlobalFindAtomA
GlobalAddAtomA
GetLocaleInfoA
GetCPInfo
GetOEMCP
VirtualAlloc
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapReAlloc
GetSystemTimeAsFileTime
ExitProcess
GetCommandLineA
RaiseException
RtlUnwind
SetStdHandle
GetFileType
HeapSize
GetACP
HeapDestroy
HeapCreate
VirtualFree
GetStdHandle
LCMapStringA
LCMapStringW
GetConsoleCP
GetConsoleMode
SetHandleCount
GetStartupInfoA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTimeZoneInformation
GetStringTypeA
GetStringTypeW
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
IsValidCodePage
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetLocaleInfoW
GetExitCodeProcess
SetEnvironmentVariableA
FormatMessageA
LocalFree
LocalAlloc
FreeLibrary
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
LoadLibraryA
FileTimeToLocalFileTime
FileTimeToSystemTime
FindResourceA
LoadResource
LockResource
SizeofResource
GetCurrentThreadId
GetCurrentProcessId
HeapFree
GetProcessHeap
HeapAlloc
WriteProcessMemory
ReadProcessMemory
VirtualQueryEx
GetCurrentProcess
ReleaseMutex
CreateMutexA
OpenMutexA
CreateThread
DeleteFileA
GetVersion
CloseHandle
GetVersionExA
GetFileTime
CompareStringA
CreateToolhelp32Snapshot
GetModuleFileNameA
WritePrivateProfileStringA
Process32Next
GetPrivateProfileStringA
SetLastError
GetLastError
InterlockedExchange
CreateDirectoryA
MultiByteToWideChar
CompareStringW
GetSystemDirectoryA
TerminateProcess
CreateProcessA
Sleep
TerminateThread
WideCharToMultiByte
GetPrivateProfileIntA
OpenProcess
GetTickCount
WaitForSingleObject
Process32First
lstrlenA
CreateFileA
InterlockedCompareExchange
GetVolumeInformationA
GetStockObject
DeleteDC
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
SetMapMode
RestoreDC
SaveDC
SetBkColor
SetTextColor
GetClipBox
CreateBitmap
DeleteObject
GetDeviceCaps
GetFileTitleA
OpenPrinterA
DocumentPropertiesA
ClosePrinter
SHGetFolderPathA
SHGetSpecialFolderPathA
UrlUnescapeA
PathStripToRootA
PathFindFileNameA
PathIsUNCA
VariantInit
VariantChangeType
VariantClear
InternetCrackUrlA
InternetOpenUrlA
InternetReadFile
InternetWriteFile
InternetSetFilePointer
InternetSetStatusCallback
InternetOpenA
InternetGetLastResponseInfoA
InternetCloseHandle
InternetCanonicalizeUrlA
InternetQueryDataAvailable
InternetQueryOptionA
InstallService
RundllInstall
RundllUninstall
ServiceMain
UninstallService
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ