DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
ed4d3cb08b855cc16b0a67254b736c5d_JaffaCakes118.dll
Resource
win7-20240221-en
Target
ed4d3cb08b855cc16b0a67254b736c5d_JaffaCakes118
Size
356KB
MD5
ed4d3cb08b855cc16b0a67254b736c5d
SHA1
9e18257e106e4b24deb5e01f1c09b11fb7248305
SHA256
81eb904cf0e665644a8edff2adb005711ef5556d021184ef8808772e22bc6866
SHA512
3624bf4cf4c094400703ccdf58d9eaf8510917d7018fe3635b586288789c3bcd59fb4649f605cced65cc1eef250d84ff8a6e7c97b78c32da48231e7d3607c86d
SSDEEP
6144:BMPPoyhS/QutqVRXxTZnhZZrR/EO7zsuTTBk/iQ/i/ze6MVwAINJ0nq:aPPMtqZ9prR/LBTTO/iQ/cDMDq
Checks for missing Authenticode signature.
resource |
---|
ed4d3cb08b855cc16b0a67254b736c5d_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
StrCmpIW
UrlEscapeW
UrlGetPartW
StrStrIW
PathMatchSpecW
UrlUnescapeW
HttpOpenRequestW
InternetCloseHandle
InternetReadFile
InternetQueryOptionW
HttpQueryInfoW
InternetSetCookieW
InternetOpenW
InternetSetOptionW
HttpSendRequestW
InternetCrackUrlW
InternetConnectW
SetEndOfFile
CreateFileA
GetModuleHandleA
GetTimeZoneInformation
SetStdHandle
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
InitializeCriticalSectionAndSpinCount
GetStringTypeW
GetStringTypeA
GetLocaleInfoA
GetCurrentDirectoryA
SetFilePointer
GetDateFormatA
GetTimeFormatA
FlushFileBuffers
GetConsoleMode
GetConsoleCP
ReadFile
IsValidCodePage
GetOEMCP
GetACP
GetCurrentProcessId
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetModuleFileNameA
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
HeapReAlloc
VirtualAlloc
VirtualFree
HeapDestroy
HeapCreate
ExitProcess
HeapSize
GetProcessHeap
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetModuleHandleW
GetFullPathNameW
GetTempFileNameW
GetFileSize
MapViewOfFile
UnmapViewOfFile
VirtualQuery
CreateFileW
LocalAlloc
CreateFileMappingW
CloseHandle
LocalFree
WaitForSingleObject
TerminateThread
Sleep
SetThreadPriority
GetExitCodeThread
FreeLibrary
WriteFile
GetProcAddress
LoadLibraryA
DeleteFileW
WideCharToMultiByte
lstrlenW
GetTempPathW
GetSystemInfo
GetWindowsDirectoryW
GetVolumeInformationW
CreateMutexW
CreateProcessW
GetTickCount
ReleaseMutex
GetSystemTime
MoveFileExW
SetEnvironmentVariableA
HeapAlloc
GetModuleFileNameW
MultiByteToWideChar
SetLastError
lstrcmpW
DeleteCriticalSection
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
GetLastError
GetCPInfo
LCMapStringW
LCMapStringA
RtlUnwind
RaiseException
FindFirstFileW
InterlockedDecrement
InterlockedIncrement
GetDriveTypeA
CompareStringA
CompareStringW
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapFree
GetCurrentThreadId
GetCommandLineA
GetSystemTimeAsFileTime
ExitThread
CreateThread
FindClose
FileTimeToSystemTime
FileTimeToLocalFileTime
GetDriveTypeW
wsprintfW
SetWindowTextW
SetWindowPos
CallWindowProcW
SetWindowLongW
SendMessageW
GetWindowTextW
RealGetWindowClassW
EnumChildWindows
GetWindowLongW
CoInitialize
CoCreateInstance
CoUninitialize
CoTaskMemFree
VariantChangeType
VariantCopy
SafeArrayDestroy
SafeArrayPutElement
SafeArrayCreateVector
SysAllocStringLen
SysFreeString
SysAllocString
SysStringLen
SysStringByteLen
SysAllocStringByteLen
VarBstrCmp
VariantInit
VariantClear
inet_addr
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
RpcStringFreeW
UuidToStringW
UrlMkGetSessionOption
MapAndLoad
UnMapAndLoad
CryptGetHashParam
CryptDestroyHash
CryptDecrypt
CryptDestroyKey
CryptCreateHash
CryptEncrypt
CryptDeriveKey
RegSetValueExW
RegCloseKey
RegDeleteValueW
RegDeleteKeyW
RegQueryValueExW
RegCreateKeyW
CryptGenRandom
CryptReleaseContext
CryptAcquireContextW
CryptHashData
SHCreateDirectoryExW
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ