DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
f1e3da866639ac9ea5d7b34f9148e684_JaffaCakes118.dll
Resource
win7-20240319-en
Target
f1e3da866639ac9ea5d7b34f9148e684_JaffaCakes118
Size
308KB
MD5
f1e3da866639ac9ea5d7b34f9148e684
SHA1
23ed3127ee82eb268a13ef376a2848c228b87da2
SHA256
3296c9e346990550a770dbc73c7d7b0c8fc4a5f5d4ae0534eea4a0d715a17aab
SHA512
c5254c3b2b983c88030d2d24cac784bada0002258b82f13c044493d29ecc9b79ce217b2bfbd90527def2bc39800c5a76ad1a669d8547523dbebacd93b4c960fa
SSDEEP
6144:+mW8CWbija7VMO13zKaJ063RPs9r6P7l5:+mW8Nbija7V/1uU7bj
Checks for missing Authenticode signature.
resource |
---|
f1e3da866639ac9ea5d7b34f9148e684_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
OpenProcess
TerminateProcess
SetFileAttributesA
GetFileAttributesA
Sleep
DeleteFileA
WideCharToMultiByte
CreateDirectoryA
GetLocalTime
CopyFileA
GetSystemDirectoryA
FreeLibrary
GetProcAddress
LoadLibraryA
CreateProcessA
Module32Next
Module32First
Process32Next
Process32First
CreateToolhelp32Snapshot
GetVersionExA
SetProcessPriorityBoost
SetThreadPriority
GetCurrentThread
SetPriorityClass
lstrcatA
lstrcpyA
GetShortPathNameA
GetEnvironmentVariableA
GetTickCount
GetSystemTime
CreateRemoteThread
GetModuleHandleA
VirtualFreeEx
WriteProcessMemory
VirtualAllocEx
ResumeThread
HeapFree
HeapAlloc
GetProcessHeap
GetCommandLineA
GetCommandLineW
OpenMutexA
GetTempPathA
WaitForSingleObject
SetWaitableTimer
CreateWaitableTimerA
LockResource
FreeResource
LoadResource
SizeofResource
FindResourceA
LoadLibraryExA
EndUpdateResourceA
UpdateResourceA
BeginUpdateResourceA
DuplicateHandle
FindClose
FindNextFileA
FindFirstFileA
GetVolumeInformationA
ExitProcess
GetCurrentProcessId
Toolhelp32ReadProcessMemory
IsBadCodePtr
SetUnhandledExceptionFilter
RaiseException
SetEnvironmentVariableA
CompareStringW
CompareStringA
FlushFileBuffers
SetStdHandle
GetStringTypeW
GetStringTypeA
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetCurrentProcess
FileTimeToLocalFileTime
FileTimeToSystemTime
lstrcpynA
GetLastError
FormatMessageA
LocalFree
SetLastError
GetWindowsDirectoryA
lstrlenW
InterlockedDecrement
InterlockedIncrement
DeleteCriticalSection
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
MultiByteToWideChar
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
HeapSize
TlsGetValue
TlsFree
TlsAlloc
TlsSetValue
GetCurrentThreadId
GetOEMCP
GetACP
GetCPInfo
LCMapStringW
LCMapStringA
HeapCreate
HeapDestroy
VirtualAlloc
VirtualFree
GetVersion
RtlUnwind
GetTimeZoneInformation
HeapReAlloc
lstrlenA
GetModuleFileNameA
DisableThreadLibraryCalls
GetCurrentDirectoryA
GetFileSize
SetFilePointer
ReadFile
CreateFileA
WriteFile
GetLongPathNameA
CloseHandle
wsprintfA
PostMessageA
KillTimer
FindWindowExA
GetWindowThreadProcessId
FindWindowA
DefWindowProcA
RegisterClassExA
CreateWindowExA
SetTimer
MessageBoxA
ShowWindow
SetWindowLongA
SendMessageA
IsWindowVisible
GetWindowRect
SetWindowPos
GetParent
GetClassNameA
GetWindowTextA
GetDesktopWindow
EnumChildWindows
RegEnumKeyExA
RegQueryValueExA
RegOpenKeyExA
RegSetValueExA
RegCreateKeyExA
OpenProcessToken
SetSecurityInfo
SetEntriesInAclA
AdjustTokenPrivileges
LookupPrivilegeValueA
RegDeleteValueA
RegEnumValueA
RegCloseKey
RegQueryInfoKeyA
LookupAccountSidA
GetTokenInformation
SHChangeNotify
SHGetSpecialFolderLocation
SHGetSpecialFolderPathA
CommandLineToArgvW
ShellExecuteExA
SHGetPathFromIDListA
CoUninitialize
CoInitialize
CoCreateGuid
CoCreateInstance
CLSIDFromString
SysFreeString
SysStringLen
LoadRegTypeLi
SysAllocStringLen
VariantClear
SysAllocString
VariantCopy
VariantChangeType
GetFileVersionInfoA
VerQueryValueA
GetFileVersionInfoSizeA
ord16
ord21
ord18
ord57
ord23
ord15
ord32
ord30
ord31
ord58
GetModuleFileNameExA
SHDeleteKeyA
Netbios
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ