Install
_Install@16
Static task
static1
Behavioral task
behavioral1
Sample
9ef29e246518f88640d892d785f2e7ac_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
9ef29e246518f88640d892d785f2e7ac_JaffaCakes118.dll
Resource
win10v2004-20241007-en
Target
9ef29e246518f88640d892d785f2e7ac_JaffaCakes118
Size
67KB
MD5
9ef29e246518f88640d892d785f2e7ac
SHA1
fdba73f21683fc0906a01f56be1f7dd304798b9f
SHA256
04a33aeb129c75670011562014b3084c08ec7c960dd7291864f55de2f25ea017
SHA512
cd620369a49b9489e3c4f1a16336a13ce57bd0356746287c5cc46ec8fbef2ce10767644401788190b2c9b885736bf2e35456aa17ea0db7d3d285ccd2d7b122b9
SSDEEP
768:q8T3q8yZUIm0ZqbMIKQMH7oZP0pjN4nxJ06qpZZjg1:FyUIm0hDQMH64sqbpDk
Checks for missing Authenticode signature.
Processes:
resource |
---|
9ef29e246518f88640d892d785f2e7ac_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
WriteFile
MultiByteToWideChar
ReleaseMutex
VirtualFreeEx
VirtualAllocEx
FindClose
FindNextFileA
lstrcmpiA
lstrcatA
GetCurrentProcess
Module32First
VirtualProtectEx
CreateMutexA
DeleteFileA
GetModuleFileNameA
CopyFileA
TerminateProcess
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
IsBadReadPtr
GetTempPathA
GetModuleHandleA
LocalAlloc
CreateFileA
InitializeCriticalSection
GetFileSize
ReadFile
LocalFree
GetLastError
CloseHandle
GetCurrentProcessId
DisableThreadLibraryCalls
WaitForSingleObject
Sleep
LoadLibraryA
GetProcAddress
WinExec
lstrcpyA
lstrlenA
GetTickCount
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
wsprintfA
GetWindowThreadProcessId
EnumWindows
SetThreadDesktop
OpenWindowStationA
IsRectEmpty
ReleaseDC
GetDC
GetWindowTextA
GetForegroundWindow
GetWindowRect
OpenDesktopA
GetObjectA
DeleteDC
BitBlt
SelectObject
CreateCompatibleBitmap
GetDeviceCaps
CreateCompatibleDC
CreateDCA
GetDIBits
RealizePalette
SelectPalette
GetStockObject
SetSecurityDescriptorDacl
OpenProcessToken
LookupPrivilegeValueA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ID@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBDABV?$allocator@D@1@@Z
?find@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDII@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?replace@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@IIABV12@II@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
getpeername
WSAStartup
closesocket
send
recv
select
connect
ioctlsocket
htons
socket
gethostbyname
strrchr
??2@YAPAXI@Z
strcpy
memcmp
atoi
_beginthreadex
strlen
sprintf
_mbsnbcpy
_mbsnbcmp
atol
_mbscmp
free
malloc
sscanf
strcat
__CxxFrameHandler
isprint
memcpy
memset
_onexit
__dllonexit
strncpy
strstr
_purecall
_splitpath
wcscmp
strchr
StrStrIA
MakeSureDirectoryPathExists
HttpOpenRequestA
HttpQueryInfoA
InternetReadFile
HttpSendRequestExA
InternetWriteFile
HttpEndRequestA
HttpAddRequestHeadersA
HttpSendRequestA
InternetCloseHandle
InternetOpenA
InternetConnectA
InternetAttemptConnect
GdipAlloc
GdipDisposeImage
GdipGetImageEncoders
GdipGetImageEncodersSize
GdiplusShutdown
GdipSaveImageToFile
GdiplusStartup
GdipFree
GdipCreateBitmapFromFile
GdipCreateBitmapFromFileICM
GdipCloneImage
Install
_Install@16
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ