@__lockDebuggerData$qv
@__unlockDebuggerData$qv
DllEntryPoint
SqlDrvInit
__DebuggerHookData
Static task
static1
Behavioral task
behavioral1
Sample
0f66b1c9fc3692b6547342a158ea8bdb_JaffaCakes118.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0f66b1c9fc3692b6547342a158ea8bdb_JaffaCakes118.dll
Resource
win10v2004-20240419-en
Target
0f66b1c9fc3692b6547342a158ea8bdb_JaffaCakes118
Size
372KB
MD5
0f66b1c9fc3692b6547342a158ea8bdb
SHA1
fb698cf35efffddb4275c0e37aa1f718ea5632ac
SHA256
1531d9ab4e455345389d94d1d5480d996b118c0ce9c61756fadd3a392083c4d7
SHA512
060019077690ea56afa523fa422120c76e6387b1192e3818210d6d2757d6055af433be0d0c236db49836b6a4c3f21404450599e7a6d5f1efcb7f4de1141a7cac
SSDEEP
6144:TD0Huuu9Kp96dfJ51hiotCg/8rN+WFN++FEG4T0:889C6RJHDt0rYa4T
Checks for missing Authenticode signature.
resource |
---|
0f66b1c9fc3692b6547342a158ea8bdb_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
LeaveCriticalSection
DeleteCriticalSection
GetEnvironmentStrings
IsDBCSLeadByte
SetFilePointer
CloseHandle
OutputDebugStringA
GetFileAttributesA
GetCommandLineA
GlobalMemoryStatus
VirtualQuery
TlsFree
GetProcAddress
EnterCriticalSection
TlsGetValue
RaiseException
GetStdHandle
GetFileType
CreateFileA
ExitProcess
GetModuleFileNameA
GetVersionExA
TlsAlloc
VirtualAlloc
WriteFile
UnhandledExceptionFilter
SetConsoleCtrlHandler
GetStartupInfoA
GetLocalTime
GetCurrentThreadId
VirtualFree
TlsSetValue
SetHandleCount
RtlUnwind
InitializeCriticalSection
GetVersion
GetModuleHandleA
GetLastError
FreeEnvironmentStringsA
ExprGenPostFix
ImltCreateTable2
OsUnlink
ImltCreateTable
LsGetTimeStampEncode
OsReadExact
_OsRealloc
LsTimeStampEncode
OsLoadDll
LsTimeStampDecode
OsWriteExact
OsSaveErrorByLang
OsFreeDll
OsGetProcAddressByName
CreateUniqFldNames
SqlDateString
TCONC
NCONC
ADDELT
MEMB
NCONS
LISTLENGTH
QGETM
DbiBatchMove
LsGetTime
ExecCallBack
GetCallBack
LsTimeDecode
OsClose
_OsCalloc
DbiGetDirectory
RegCallBack
CloseCallBack
LsTimeEncode
OpenCallBack
LBlobOpen
LsGetDate
OsOpenRW
OsLdIsAlpha
GetWorldFlags
OsLdUnloadObj
LsDateDecode
OsSetPrivateProfileString
OsGetPrivateProfileString
OsLdMBRStrICmp
OsLdMBRStrChr
OsLdMBRStrNICmp
OsLdMBRisKana
OsLdMBRisLead
OsLdOemToAnsi
CreateDrvObj
CreateDbObj
OsLdAnsiToOem
LsDateEncode
OsSeek
_OsMalloc
CreateVtObj
OsGetProcessId
OsLdGetSymbName
OsGetSharedPtr
OsMuxUnlock
OsLdStrnToUpper
OsClearError
OsMuxLock
OsFileExistsSearch
OsLdStrnCmpi
DbiFreeSQLRequest
DbiGetSQLRequest
OsLdStrnCmp
OsGetTempName
OsCreate
OsNmBldFName
OsNmPrsFName
OsLdLoadBySymbName
DbiGetObjFromName
SysYield
OsLdGetDefaultObj
OsGetTime
OsNmGetFName
OsSwFree
DbiSetToBegin
_OsFree
OsSwMalloc
DbiDeleteTable
DbiOpenTable
FAMILY
OsFileLength
TYPEOF
PARSEPATTERN
OemToCharA
MessageBoxA
IsCharAlphaNumericA
EnumThreadWindows
@__lockDebuggerData$qv
@__unlockDebuggerData$qv
DllEntryPoint
SqlDrvInit
__DebuggerHookData
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE