DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
f28e3c4488a89222bac685fa89e888c4_JaffaCakes118.dll
Resource
win7-20240221-en
Target
f28e3c4488a89222bac685fa89e888c4_JaffaCakes118
Size
355KB
MD5
f28e3c4488a89222bac685fa89e888c4
SHA1
b02f51b3cc796d5c11f49fda6d3eda41f72abd4c
SHA256
46e318541b4b2ce0e199ea8eb4e2ff462b2c3b3da944744ce8bb034a2af1e00b
SHA512
e876fbee9eae72ac02932b9afeadd7c90de1d3448fd86e59333cb21d328649e057c7d5eda8f4fa973d1d9240e36a32546e1d8d1877815354a37d301c1a84df5a
SSDEEP
6144:XczSeKLIuNgDsmM/+xL3VLrYiYErRhz57S2TTBkxl7GLwZwkEbXT0Z+:XcGYIp/amerRhlVTT+xl7Gk1E5
Checks for missing Authenticode signature.
resource |
---|
f28e3c4488a89222bac685fa89e888c4_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
StrCmpIW
UrlEscapeW
UrlGetPartW
StrStrIW
PathMatchSpecW
UrlUnescapeW
HttpOpenRequestW
InternetCloseHandle
InternetReadFile
InternetQueryOptionW
HttpQueryInfoW
InternetSetCookieW
InternetOpenW
InternetSetOptionW
HttpSendRequestW
InternetCrackUrlW
InternetConnectW
SetEndOfFile
CreateFileA
GetModuleHandleA
GetTimeZoneInformation
SetStdHandle
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
InitializeCriticalSectionAndSpinCount
GetStringTypeW
GetStringTypeA
GetLocaleInfoA
GetCurrentDirectoryA
SetFilePointer
GetDateFormatA
GetTimeFormatA
FlushFileBuffers
GetConsoleMode
GetConsoleCP
ReadFile
IsValidCodePage
GetOEMCP
GetACP
GetCurrentProcessId
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetModuleFileNameA
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
HeapReAlloc
VirtualAlloc
VirtualFree
HeapDestroy
HeapCreate
ExitProcess
HeapSize
GetProcessHeap
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetModuleHandleW
GetFullPathNameW
GetTempFileNameW
GetFileSize
MapViewOfFile
UnmapViewOfFile
VirtualQuery
CreateFileW
LocalAlloc
CreateFileMappingW
CloseHandle
LocalFree
WaitForSingleObject
TerminateThread
Sleep
SetThreadPriority
GetExitCodeThread
FreeLibrary
WriteFile
GetProcAddress
LoadLibraryA
DeleteFileW
WideCharToMultiByte
lstrlenW
GetTempPathW
GetSystemInfo
GetWindowsDirectoryW
GetVolumeInformationW
CreateMutexW
CreateProcessW
GetTickCount
ReleaseMutex
GetSystemTime
MoveFileExW
SetEnvironmentVariableA
HeapAlloc
GetModuleFileNameW
MultiByteToWideChar
SetLastError
lstrcmpW
DeleteCriticalSection
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
GetLastError
GetCPInfo
LCMapStringW
LCMapStringA
RtlUnwind
RaiseException
FindFirstFileW
InterlockedDecrement
InterlockedIncrement
GetDriveTypeA
CompareStringA
CompareStringW
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapFree
GetCurrentThreadId
GetCommandLineA
GetSystemTimeAsFileTime
ExitThread
CreateThread
FindClose
FileTimeToSystemTime
FileTimeToLocalFileTime
GetDriveTypeW
wsprintfW
SetWindowTextW
SetWindowPos
CallWindowProcW
SetWindowLongW
SendMessageW
GetWindowTextW
RealGetWindowClassW
EnumChildWindows
GetWindowLongW
CoInitialize
CoCreateInstance
CoUninitialize
CoTaskMemFree
VariantChangeType
VariantCopy
SafeArrayDestroy
SafeArrayPutElement
SafeArrayCreateVector
SysAllocStringLen
SysFreeString
SysAllocString
SysStringLen
SysStringByteLen
SysAllocStringByteLen
VarBstrCmp
VariantInit
VariantClear
inet_addr
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
RpcStringFreeW
UuidToStringW
UrlMkGetSessionOption
MapAndLoad
UnMapAndLoad
CryptGetHashParam
CryptDestroyHash
CryptDecrypt
CryptDestroyKey
CryptCreateHash
CryptEncrypt
CryptDeriveKey
RegSetValueExW
RegCloseKey
RegDeleteValueW
RegDeleteKeyW
RegQueryValueExW
RegCreateKeyW
CryptGenRandom
CryptReleaseContext
CryptAcquireContextW
CryptHashData
SHCreateDirectoryExW
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ