DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
e731078897fd2774d5d50bac15a1cf46_JaffaCakes118.dll
Resource
win7-20240221-en
Target
e731078897fd2774d5d50bac15a1cf46_JaffaCakes118
Size
232KB
MD5
e731078897fd2774d5d50bac15a1cf46
SHA1
6f1fae96a87817f62ec8d4cf9b6a0c7603311688
SHA256
2b9f10a3265df5f5f829d0e62c7f308b4462d4eec2a6e2bdfb57341d6b60a761
SHA512
34263261a6f083ed87157166da4966d2b8d51ac2d719d8bdecf4902b17e30ffd471532327e17defd6c8c0c3967453daed3b763fc865243ff46d98180199d8a74
SSDEEP
3072:HcSaO3JB6Qt0kM0OgeT6bxfy4MxGfGffTuXCtWEMzcfjUPainPWEIgGxSDW9RNyZ:tvJt5effYajUPaiPdGx19TEvq
Checks for missing Authenticode signature.
resource |
---|
e731078897fd2774d5d50bac15a1cf46_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetProcAddress
LoadLibraryA
LocalFree
Process32Next
Process32First
CreateToolhelp32Snapshot
VirtualFreeEx
WaitForSingleObject
CreateRemoteThread
GetModuleHandleA
WriteProcessMemory
VirtualAllocEx
OpenProcess
CreateProcessA
CopyFileA
CreateMutexA
OpenMutexA
TerminateThread
DisableThreadLibraryCalls
GetModuleFileNameA
HeapAlloc
GetSystemInfo
GetVersionExA
FreeLibrary
InitializeCriticalSection
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
CompareStringW
CompareStringA
FlushFileBuffers
SetStdHandle
GetStringTypeW
GetThreadLocale
IsBadCodePtr
IsBadReadPtr
IsBadWritePtr
VirtualAlloc
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
HeapCreate
ReadFile
GetStringTypeExA
OutputDebugStringA
DebugBreak
InterlockedDecrement
GetTickCount
GetTempPathA
GetTempFileNameA
Sleep
lstrcmpA
InterlockedIncrement
MultiByteToWideChar
lstrlenW
WideCharToMultiByte
CloseHandle
CreateThread
GetLocalTime
GetEnvironmentVariableA
CreateDirectoryA
FindFirstFileA
VirtualFree
HeapDestroy
LCMapStringW
LCMapStringA
GetOEMCP
GetACP
GetCPInfo
HeapSize
GetCurrentProcess
TerminateProcess
ExitProcess
HeapReAlloc
SetUnhandledExceptionFilter
HeapFree
GetVersion
GetCommandLineA
GetSystemTime
GetTimeZoneInformation
SetCurrentDirectoryA
GetCurrentDirectoryA
SetEnvironmentVariableA
RaiseException
RtlUnwind
GetLastError
GetFileAttributesA
DeleteFileA
FindNextFileA
FindClose
lstrlenA
SetFilePointer
WriteFile
CreateFileA
GetFileSize
GetStringTypeA
SetWindowLongA
CharNextA
LoadStringA
SetTimer
DestroyWindow
SendMessageA
KillTimer
BringWindowToTop
SetFocus
SetForegroundWindow
SetActiveWindow
SetWindowPos
CharLowerA
ShowWindow
ReleaseDC
GetDC
wsprintfW
GetWindowLongA
wvsprintfA
GetDeviceCaps
CryptDestroyHash
RegEnumKeyExA
RegQueryInfoKeyA
RegOpenKeyExA
RegCreateKeyExA
RegDeleteKeyA
RegSetValueExA
RegQueryValueExA
CryptAcquireContextA
CryptCreateHash
CryptHashData
CryptGetHashParam
CryptReleaseContext
RegCloseKey
CoCreateInstance
CoInitialize
CoUninitialize
SysFreeString
SysAllocStringLen
VariantClear
SysAllocString
VariantCopy
VariantChangeType
SysStringLen
LoadRegTypeLi
InternetOpenUrlA
InternetCrackUrlA
InternetReadFile
HttpQueryInfoA
HttpOpenRequestA
HttpAddRequestHeadersA
HttpSendRequestA
InternetOpenA
InternetConnectA
InternetAttemptConnect
InternetCloseHandle
Netbios
URLDownloadToFileA
ord58
ord32
ord16
ord57
ord15
ord21
ord23
ord30
ord31
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ