EnterDll
adsfdsfg
retyrtuyrtuy
Static task
static1
Behavioral task
behavioral1
Sample
7162fdf107c2d36f99c59d5435a4d399_JaffaCakes118.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7162fdf107c2d36f99c59d5435a4d399_JaffaCakes118.dll
Resource
win10v2004-20240226-en
Target
7162fdf107c2d36f99c59d5435a4d399_JaffaCakes118
Size
363KB
MD5
7162fdf107c2d36f99c59d5435a4d399
SHA1
b4ffeac7e7b25409b709377430dfe8821ca21e6e
SHA256
1f9f8cf325ff2de752478ff0623086019ebd1ffbce1d1c2f60e0b70149279f10
SHA512
4098f01ba4da3742e96a70cf2478c26d8a24db1c97b048d27c40cb4f28c221c180ae356536b5bda41d9d041aa029dc951a90cd7fa038a5a7bc4c4d27a7fa95f8
SSDEEP
6144:RM8CPvvwq0YslcteDNCfgQ/Fkp8HuubxwHdy/6E6OuUNkTf:kvvwTYslTMIQQubxTNkD
Checks for missing Authenticode signature.
Processes:
resource |
---|
7162fdf107c2d36f99c59d5435a4d399_JaffaCakes118 |
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
PdhValidatePathW
PdhGetFormattedCounterValue
PdhCollectQueryData
PdhCloseQuery
PdhRemoveCounter
PdhAddCounterW
PdhOpenQueryW
SizeofResource
LoadResource
FindResourceW
LoadLibraryExW
GetModuleFileNameW
MulDiv
EnterCriticalSection
LeaveCriticalSection
GetCurrentThreadId
SetLastError
DeleteCriticalSection
InitializeCriticalSectionEx
DecodePointer
DisableThreadLibraryCalls
SetStdHandle
GetStringTypeW
GetLastError
LCMapStringW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
HeapReAlloc
HeapSize
GetFileType
GetStdHandle
RaiseException
lstrcmpiW
GetModuleHandleW
GetProcAddress
FreeLibrary
MultiByteToWideChar
FindClose
CloseHandle
CreateFileW
WriteConsoleW
SetFilePointerEx
FlushFileBuffers
WriteFile
GetModuleHandleExW
GetConsoleOutputCP
ExitProcess
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
InitializeCriticalSectionAndSpinCount
GetConsoleMode
InterlockedFlushSList
RtlPcToFileHeader
RtlUnwindEx
LocalFree
WideCharToMultiByte
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
GetStartupInfoW
IsProcessorFeaturePresent
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsDebuggerPresent
OutputDebugStringW
EncodePointer
HeapAlloc
HeapFree
GetProcessHeap
InitializeSListHead
InterlockedPopEntrySList
InterlockedPushEntrySList
GetCurrentProcess
FlushInstructionCache
VirtualAlloc
VirtualFree
LoadLibraryExA
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
GetParent
CharNextW
CallWindowProcW
GetWindowLongPtrW
SetWindowLongPtrW
CreateWindowExW
DefWindowProcW
GetClassInfoExW
RegisterClassExW
UnregisterClassW
SetTimer
ReleaseDC
GetDC
EndPaint
ClientToScreen
SendMessageW
LoadCursorW
BeginPaint
DrawTextW
InvalidateRect
InsertMenuW
GetClientRect
DestroyWindow
ShowWindow
IsWindow
DeleteDC
BitBlt
SetBkMode
CreateCompatibleBitmap
CreateCompatibleDC
DeleteObject
SelectObject
SetTextColor
GetDeviceCaps
CreateFontW
GetTextMetricsW
RegDeleteValueW
RegCreateKeyExW
RegSetValueExW
RegOpenKeyExW
RegEnumKeyExW
RegQueryInfoKeyW
RegCloseKey
RegDeleteKeyW
SHGetFolderPathW
ShellExecuteW
OleRun
CoTaskMemFree
CoTaskMemRealloc
CoTaskMemAlloc
CoCreateInstance
CoInitialize
LoadTypeLi
LoadRegTypeLi
VarUI4FromStr
SysAllocStringLen
VarBstrCmp
VariantChangeType
VariantClear
VariantCopy
VariantInit
SysStringLen
SysAllocString
SysFreeString
EnterDll
adsfdsfg
retyrtuyrtuy
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ