DFH
ETH
Startup
UserLog
Static task
static1
Behavioral task
behavioral1
Sample
4412a1a155abfdb92e16cb85fe672b80_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4412a1a155abfdb92e16cb85fe672b80_JaffaCakes118.dll
Resource
win10v2004-20241007-en
Target
4412a1a155abfdb92e16cb85fe672b80_JaffaCakes118
Size
340KB
MD5
4412a1a155abfdb92e16cb85fe672b80
SHA1
b1cf0216e5913283f5a9f9a2dbeef3cbf591bc93
SHA256
9f5a45cd98b260e425089fb9db92cfe3d6dcec1d9962d39f0f5bb220a1399aa2
SHA512
dc7bf4969f621caee73ac584b7fa9b57908bd6a0d487e4ed9467c7e62f350450116dfcbafb2367c82148b6cef24ab4a19470fd1d7a60ee8f1faf5ab86d7495e4
SSDEEP
6144:Ftj2FrXme8dYo08mUJ0qTXz8hgIDWTBiUyOZb3bk:Ftj6rXmcoZR8WTYEb3
Checks for missing Authenticode signature.
resource |
---|
4412a1a155abfdb92e16cb85fe672b80_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
WSAStartup
StrFormatByteSizeA
InternetOpenA
InternetCrackUrlA
InternetConnectA
InternetGetLastResponseInfoA
FtpPutFileA
HttpOpenRequestA
HttpSendRequestA
HttpQueryInfoA
InternetReadFile
InternetCloseHandle
FtpSetCurrentDirectoryA
FtpCreateDirectoryA
InternetQueryDataAvailable
InternetWriteFile
InternetSetFilePointer
InternetSetStatusCallback
InternetOpenUrlA
InternetCanonicalizeUrlA
InternetQueryOptionA
SnmpUtilOidNCmp
SnmpUtilOidCpy
SnmpUtilVarBindFree
Netbios
FlushFileBuffers
WriteFile
ReadFile
ConnectNamedPipe
CreateNamedPipeA
GetCommandLineA
GetWindowsDirectoryA
lstrcpynA
SetFilePointer
GetDriveTypeA
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
SetVolumeLabelA
GetDiskFreeSpaceA
GetCurrentThreadId
GetCurrentThread
lstrcmpiA
lstrcmpA
GlobalDeleteAtom
GlobalAlloc
GlobalLock
WaitForSingleObject
InterlockedIncrement
InterlockedDecrement
WideCharToMultiByte
MultiByteToWideChar
DuplicateHandle
LockFile
UnlockFile
SetEndOfFile
MoveFileA
lstrcpyA
GetFullPathNameA
EnterCriticalSection
DisconnectNamedPipe
InitializeCriticalSection
DeleteCriticalSection
LeaveCriticalSection
GetFileSize
LocalFileTimeToFileTime
SystemTimeToFileTime
FileTimeToSystemTime
FileTimeToLocalFileTime
TlsAlloc
GlobalFree
GlobalUnlock
GlobalHandle
TlsFree
GlobalReAlloc
TlsSetValue
LocalReAlloc
TlsGetValue
SetErrorMode
lstrcatA
GlobalFlags
WritePrivateProfileStringA
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
GetProcessVersion
GetCPInfo
GetOEMCP
RtlUnwind
RaiseException
GetTimeZoneInformation
GetSystemTime
HeapFree
HeapAlloc
ExitProcess
HeapReAlloc
SetEnvironmentVariableA
SetCurrentDirectoryA
GetACP
HeapSize
SetStdHandle
GetFileType
SetUnhandledExceptionFilter
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
SetHandleCount
GetStdHandle
GetStartupInfoA
CompareStringA
CompareStringW
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
IsBadReadPtr
IsBadCodePtr
GetExitCodeProcess
CreateProcessA
SetFileAttributesA
SetFileTime
FormatMessageA
LocalFree
GetCurrentDirectoryA
GetTickCount
GetVersion
GetModuleHandleA
GetModuleFileNameA
DeviceIoControl
lstrlenA
LoadLibraryA
GetProcAddress
FreeLibrary
SetLastError
GetVersionExA
CreateFileA
GetFileTime
CloseHandle
GetFileAttributesA
OpenProcess
TerminateProcess
GetCurrentProcess
GetLastError
RemoveDirectoryA
FindFirstFileA
DeleteFileA
FindNextFileA
FindClose
CreateDirectoryA
GetLocalTime
GetVolumeInformationA
Sleep
CreateThread
ResumeThread
SetThreadPriority
InterlockedExchange
LocalAlloc
TabbedTextOutA
DrawTextA
GrayStringA
GetDlgItem
SetWindowLongA
SetWindowPos
ShowWindow
SetFocus
GetWindowPlacement
IsIconic
SystemParametersInfoA
RegisterWindowMessageA
SetForegroundWindow
GetForegroundWindow
GetMessagePos
GetMessageTime
RemovePropA
CallWindowProcA
GetPropA
SetPropA
GetClassLongA
CreateWindowExA
DestroyWindow
DefWindowProcA
GetMenuItemID
GetSubMenu
GetMenu
RegisterClassA
GetClassInfoA
WinHelpA
GetCapture
GetTopWindow
CopyRect
GetDC
AdjustWindowRectEx
GetSysColor
MapWindowPoints
LoadIconA
LoadCursorA
GetSysColorBrush
LoadStringA
DestroyMenu
ClientToScreen
GetWindow
GetDlgCtrlID
GetWindowRect
PtInRect
GetClassNameA
UnregisterClassA
UnhookWindowsHookEx
CharUpperA
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
GetKeyState
CallNextHookEx
ValidateRect
IsWindowVisible
PeekMessageA
GetCursorPos
SetWindowsHookExA
GetParent
GetLastActivePopup
IsWindowEnabled
GetWindowLongA
EnableWindow
SetCursor
PostMessageA
PostQuitMessage
CharToOemBuffA
OemToCharBuffA
GetSystemMetrics
SendMessageA
wsprintfA
ExitWindowsEx
MessageBoxA
ReleaseDC
GetMenuItemCount
GetWindowTextA
GetClientRect
SetWindowTextA
RestoreDC
GetDeviceCaps
SaveDC
DeleteDC
DeleteObject
CreateBitmap
GetObjectA
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
SelectObject
GetStockObject
SetBkColor
SetTextColor
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
GetClipBox
GetFileTitleA
ClosePrinter
OpenPrinterA
DocumentPropertiesA
LookupPrivilegeValueA
OpenProcessToken
RegCloseKey
RegCreateKeyExA
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
AdjustTokenPrivileges
ShellExecuteA
ord17
URLDownloadToFileA
DFH
ETH
Startup
UserLog
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ