DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
fdef7b378e693d7daef8f0fac3353d13_JaffaCakes118.dll
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
fdef7b378e693d7daef8f0fac3353d13_JaffaCakes118.dll
Resource
win10v2004-20240412-en
Target
fdef7b378e693d7daef8f0fac3353d13_JaffaCakes118
Size
84KB
MD5
fdef7b378e693d7daef8f0fac3353d13
SHA1
746e6c309f5861eb5baf8eb840cd76124e5569b2
SHA256
4203d28daa4bf993c21b9892eb82dfb3be912a1a042f7aaebc1d5531f335b35d
SHA512
6f84fcba3d1f6b6ef1621cc79f757a486a79e9d01358306e793d4d64692b63a2a3288ecfe95d0d70f4f1124880a927eeee77fc3e6a0d2b70c6bc05c84d32fe62
SSDEEP
1536:xUjstAmCWiP4JC2BYoAVCfLjGezvbCxdoENVna1Uos:e4AmMP4JCcYiTz8doENVna1U
Checks for missing Authenticode signature.
resource |
---|
fdef7b378e693d7daef8f0fac3353d13_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetStringTypeExA
GetThreadLocale
CopyFileA
DeleteFileA
InterlockedIncrement
WinExec
lstrcmpA
CreateDirectoryA
GetEnvironmentVariableA
GetTempFileNameA
OutputDebugStringA
CreateThread
SetEvent
FreeLibrary
GetProcAddress
LoadLibraryA
LocalFree
DebugBreak
Sleep
MultiByteToWideChar
lstrlenW
WideCharToMultiByte
OpenMutexA
CreateMutexA
InterlockedDecrement
HeapCreate
GetVersionExA
GetSystemInfo
HeapAlloc
DisableThreadLibraryCalls
ReadFile
SetFilePointer
WriteFile
CreateFileA
GetFileSize
lstrlenA
GetSystemDirectoryA
CloseHandle
SetTimer
SendMessageA
KillTimer
LoadStringA
BringWindowToTop
SetFocus
SetForegroundWindow
SetActiveWindow
wvsprintfA
SetWindowPos
ShowWindow
SetWindowLongA
GetWindowLongA
CharNextA
CharLowerA
GetDC
ReleaseDC
DestroyWindow
GetDeviceCaps
RegCreateKeyExA
RegDeleteKeyA
RegCloseKey
RegOpenKeyExA
RegSetValueExA
RegQueryValueExA
CoInitialize
CoCreateInstance
CoUninitialize
SysAllocStringLen
SysFreeString
VariantClear
SysAllocString
InternetReadFile
InternetOpenUrlA
HttpQueryInfoA
InternetOpenA
InternetCloseHandle
Netbios
URLDownloadToFileA
ord21
ord16
ord15
ord18
ord57
ord30
??_7out_of_range@std@@6B@
??1out_of_range@std@@UAE@XZ
??0out_of_range@std@@QAE@ABV01@@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
??0logic_error@std@@QAE@ABV01@@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
??0logic_error@std@@QAE@ABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@1@@Z
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ID@Z
atol
time
strcmp
strcpy
wcslen
_strnicmp
_except_handler3
memcpy
strcat
memset
??2@YAPAXI@Z
strlen
sprintf
_CxxThrowException
memcmp
atoi
memmove
strstr
fclose
fgets
??0exception@@QAE@ABV0@@Z
rand
srand
strtok
free
??1type_info@@UAE@XZ
__dllonexit
_onexit
_initterm
malloc
_adjust_fdiv
_stricmp
fopen
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ