DllCanUnloadNow
DllGetClassObject
DllRegisterServer
Static task
static1
Behavioral task
behavioral1
Sample
f9561ef9ce2fd062f171cd1e8e2fff2b_JaffaCakes118.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f9561ef9ce2fd062f171cd1e8e2fff2b_JaffaCakes118.dll
Resource
win10v2004-20240226-en
Target
f9561ef9ce2fd062f171cd1e8e2fff2b_JaffaCakes118
Size
285KB
MD5
f9561ef9ce2fd062f171cd1e8e2fff2b
SHA1
e3aff30320e457b169763b48fb541d4a93fe2165
SHA256
f91f0f744281f7c17bf9e15557021d614dbc7ac596b1e4f4dc9eaa8cb523524a
SHA512
1494594c9492bdb75bfdaf0bf383d4f4453fce7ee0d2b92125b3b58fc8840ead646dd2dbb68dd6d75f531243f3b937451ef01675e47420f22c2fd4f236bd333a
SSDEEP
6144:cwvA37WPAt5JcYNx6oU3030w+RXkVaOKnyMahUvml:J251X6oUkkwagCmhgml
Checks for missing Authenticode signature.
resource |
---|
f9561ef9ce2fd062f171cd1e8e2fff2b_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
SHDeleteKeyA
ord3830
ord3353
ord2976
ord2985
ord3262
ord3136
ord4465
ord3259
ord3147
ord2982
ord540
ord860
ord4202
ord2764
ord800
ord354
ord5186
ord1979
ord665
ord823
ord825
ord614
ord6877
ord6648
ord2818
ord5683
ord6779
ord353
ord5773
ord5442
ord6385
ord3831
ord537
ord4278
ord858
ord939
ord4129
ord535
ord3825
ord3079
ord4080
ord4622
ord4424
ord3579
ord859
ord923
ord5608
ord925
ord4204
ord5710
ord690
ord1988
ord3318
ord2803
ord5207
ord389
ord6876
ord6778
ord1601
ord6143
ord6883
ord536
ord6662
ord861
ord6663
ord1158
ord2915
ord2763
ord801
ord924
ord772
ord500
ord541
ord4277
ord926
ord1105
ord290
ord539
ord1200
ord6467
ord1154
ord2486
ord940
ord941
ord922
__dllonexit
atof
time
_adjust_fdiv
_wcsicmp
_strcmpi
memcpy
memset
_CxxThrowException
_initterm
??1type_info@@UAE@XZ
?terminate@@YAXXZ
rand
_mbscmp
free
srand
malloc
realloc
atoi
rename
printf
localtime
asctime
fopen
__CxxFrameHandler
fputs
fclose
sprintf
_except_handler3
_onexit
strstr
LocalFree
GetVersion
GetVersionExA
lstrcmpA
lstrcatA
ExpandEnvironmentStringsA
FindNextFileA
FindFirstFileA
MulDiv
FreeLibrary
lstrcpyA
lstrcpynA
ReadFile
GetLocaleInfoA
OpenFile
WriteFile
GetProcAddress
LoadLibraryA
GetExitCodeProcess
OpenProcess
Process32Next
Process32First
CreateToolhelp32Snapshot
GetSystemDirectoryA
GetLastError
GetCurrentProcess
CopyFileA
CreateProcessA
WideCharToMultiByte
Sleep
InterlockedIncrement
InterlockedDecrement
MultiByteToWideChar
ResumeThread
CreateThread
lstrlenA
GetWindowsDirectoryA
CloseHandle
GetFileSize
CreateFileA
GetModuleFileNameA
DeleteFileA
TerminateProcess
ReleaseDC
ScreenToClient
ClientToScreen
ShowWindow
SetDlgItemTextA
GetWindowDC
IsCharAlphaNumericA
IsWindow
PostMessageA
GetParent
GetWindowThreadProcessId
IsChild
SetWindowTextA
MessageBoxA
SetWindowPos
GetWindowRect
GetDesktopWindow
GetCursorPos
CallWindowProcA
GetDlgItemTextA
EndDialog
GetDlgItem
GetDC
DialogBoxParamA
GetSystemMetrics
EnumWindows
SetFocus
WaitForInputIdle
GetForegroundWindow
MessageBoxW
wsprintfA
SetForegroundWindow
EnableWindow
SetWindowLongA
SendMessageA
FindWindowExA
GetDeviceCaps
SetBkColor
SetTextColor
CreateFontA
BitBlt
CreateCompatibleDC
CreateCompatibleBitmap
SelectObject
SetPixel
DeleteObject
CreateSolidBrush
RegQueryValueExA
RegOpenKeyExA
RegSetValueExA
RegCloseKey
RegCreateKeyExA
RegEnumKeyExA
OpenProcessToken
RegDeleteValueA
RegDeleteKeyA
AdjustTokenPrivileges
LookupPrivilegeValueA
ShellExecuteA
ord252
CoUninitialize
CoCreateInstance
CoInitialize
SysFreeString
VariantClear
SysAllocStringLen
SysAllocStringByteLen
VariantInit
VariantCopy
SysAllocString
SafeArrayCreateVector
SafeArrayAccessData
SafeArrayUnaccessData
OleSavePictureFile
OleLoadPicturePath
GetErrorInfo
SysStringByteLen
FindCloseUrlCache
DeleteUrlCacheEntry
FindFirstUrlCacheEntryA
InternetOpenUrlA
FtpCreateDirectoryA
FtpFindFirstFileA
FtpOpenFileA
InternetWriteFile
InternetFindNextFileA
InternetOpenA
InternetConnectA
HttpOpenRequestA
HttpSendRequestA
FindNextUrlCacheEntryA
InternetCloseHandle
InternetReadFile
WSACleanup
inet_ntoa
gethostbyname
WSAStartup
CertCloseStore
CertOpenSystemStoreA
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ