ServiceMain
StartRouter
Static task
static1
Behavioral task
behavioral1
Sample
52210b7e1a1b11670724104a0fecdf65_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
52210b7e1a1b11670724104a0fecdf65_JaffaCakes118.dll
Resource
win10v2004-20241007-en
Target
52210b7e1a1b11670724104a0fecdf65_JaffaCakes118
Size
136KB
MD5
52210b7e1a1b11670724104a0fecdf65
SHA1
e4a4d37438aa24cf5e830692b9e5133728c8c1f1
SHA256
f5e4b45681313c5e3e12cd3fa22f6a4a545e54df27a0fc45367f2d600a46fa9a
SHA512
5361aabe0d228ff584fb4c5c7fb9774b6a49bf940b1a874de876493ab16a0c7a0e0b8721f006137de1a77a4818c2e55cee5c78e6c0bcfbebaf514418bc3f2f1a
SSDEEP
3072:3fLbGrkMvcw3i4ukQyhZ8765CAH9/nkprc/8:PLbGws3zLQyhykCAHNa
Checks for missing Authenticode signature.
resource |
---|
52210b7e1a1b11670724104a0fecdf65_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
WaitForSingleObject
SetEvent
ResumeThread
CreateThread
CreateEventA
CloseHandle
TerminateThread
GetProcAddress
LoadLibraryA
EnterCriticalSection
VirtualFree
VirtualAlloc
ResetEvent
GetPrivateProfileSectionNamesA
FreeLibrary
lstrcmpA
GetPrivateProfileStringA
GetVersionExA
MoveFileA
CreateProcessA
lstrcpyA
GetDriveTypeA
GetDiskFreeSpaceExA
GetVolumeInformationA
GetLogicalDriveStringsA
LocalFree
FindFirstFileA
RemoveDirectoryA
GetFileSize
CreateFileA
WriteFile
SetLastError
GetModuleFileNameA
ExitThread
SleepEx
lstrlenA
WritePrivateProfileStringA
DeleteFileA
GetCurrentProcess
LeaveCriticalSection
Sleep
DeleteCriticalSection
InitializeCriticalSection
GetLocalTime
MapViewOfFile
CreateFileMappingA
GetProcessHeap
UnmapViewOfFile
GlobalFree
GlobalLock
GlobalAlloc
GlobalUnlock
GlobalSize
GetTickCount
GetStartupInfoA
DisconnectNamedPipe
PeekNamedPipe
WaitForMultipleObjects
GetSystemInfo
ReleaseMutex
OpenEventA
SetErrorMode
CreateMutexA
FreeConsole
LocalAlloc
GetLastError
GetCurrentThreadId
RaiseException
InterlockedExchange
strstr
memcmp
strchr
strcat
strcpy
malloc
strcmp
free
_except_handler3
strrchr
strncpy
_CxxThrowException
strlen
strncmp
_errno
exit
realloc
wcstombs
_beginthreadex
calloc
??1type_info@@UAE@XZ
_initterm
_adjust_fdiv
_ftol
ceil
memmove
__CxxFrameHandler
??3@YAXPAX@Z
atoi
??2@YAPAXI@Z
_strupr
_strnicmp
memset
memcpy
_strrev
_strcmpi
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
ICSeqCompressFrame
ServiceMain
StartRouter
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ