@__lockDebuggerData$qv
@__unlockDebuggerData$qv
DllEntryPoint
SqlDrvInit
__DebuggerHookData
Static task
static1
Behavioral task
behavioral1
Sample
133c1424f7ead5ae0b3b25ecb6cd2d97_JaffaCakes118.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
133c1424f7ead5ae0b3b25ecb6cd2d97_JaffaCakes118.dll
Resource
win10v2004-20240419-en
Target
133c1424f7ead5ae0b3b25ecb6cd2d97_JaffaCakes118
Size
422KB
MD5
133c1424f7ead5ae0b3b25ecb6cd2d97
SHA1
80d6d77c82cb4c9a0d8b53362a3829b15780f619
SHA256
b41e284ef4463f27ec9937f78e95a496a143dc0ccb5b03536e2fc9084004547d
SHA512
f706b4b19d2e77ba98c44d59c3c01c7303f7d8276f043fb638dd6efc5c1315862adf6703c00dd73bad454a6462801d3a3e588c1848168c4d3e837f8282773db4
SSDEEP
6144:VYk3mNpRisv+DzmNatQKdvlwd6Ij7OMFn0ZlTU:VYk3mdiXDzmSvyd6Ieb3T
Checks for missing Authenticode signature.
resource |
---|
133c1424f7ead5ae0b3b25ecb6cd2d97_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
InterlockedDecrement
TlsFree
SearchPathA
ReleaseMutex
RaiseException
VirtualQuery
TlsAlloc
GlobalAlloc
CreateMutexA
DeleteCriticalSection
GetProcAddress
LeaveCriticalSection
UnhandledExceptionFilter
WriteFile
CreateFileA
SetFilePointer
LoadLibraryA
GlobalLock
GetCommandLineA
GetCurrentDirectoryA
FindClose
EnterCriticalSection
GetEnvironmentStrings
GetLocalTime
GetStdHandle
IsDBCSLeadByte
SetConsoleCtrlHandler
TlsSetValue
SetErrorMode
VirtualAlloc
GetVersionExA
VirtualFree
TlsGetValue
SetHandleCount
RtlUnwind
OutputDebugStringA
InterlockedIncrement
GlobalMemoryStatus
GetModuleFileNameA
GetModuleHandleA
GetFileType
GetCurrentThreadId
FreeEnvironmentStringsA
FindFirstFileA
FatalAppExitA
ExitProcess
CloseHandle
FreeLibrary
GetFileAttributesA
GetLastError
GetStartupInfoA
GetVersion
InitializeCriticalSection
OemToCharA
IsCharAlphaNumericA
MessageBoxA
EnumThreadWindows
TYPEOF
ExprGenPostFix
PARSEPATTERN
QGETM
FAMILY
ImltCreateTable2
OsUnlink
LISTLENGTH
NCONS
ImltCreateTable
MEMB
ADDELT
LsGetTimeStampEncode
OsReadExact
_OsRealloc
NCONC
TCONC
LsTimeStampEncode
SqlDateString
CreateUniqFldNames
LsTimeStampDecode
OsWriteExact
OsSaveErrorByLang
DbiBatchMove
LsGetTime
ExecCallBack
GetCallBack
LsTimeDecode
OsClose
_OsCalloc
DbiGetDirectory
RegCallBack
CloseCallBack
LsTimeEncode
OpenCallBack
LBlobOpen
LsGetDate
OsOpenRW
DbiOpenTable
LsDateDecode
OsLdIsAlpha
OsSeek
OsLdMBRisLead
OsLdMBRisKana
OsLdUnloadObj
_OsMalloc
OsLdMBRStrNICmp
OsLdMBRStrChr
OsLdOemToAnsi
OsLdMBRStrICmp
GetWorldFlags
OsLdAnsiToOem
LsDateEncode
DbiSetToBegin
OsSetPrivateProfileString
OsGetPrivateProfileString
OsLdGetSymbName
CreateDrvObj
CreateDbObj
OsLdStrnToUpper
OsClearError
CreateVtObj
OsGetProcessId
OsLdStrnCmpi
OsGetSharedPtr
OsMuxUnlock
OsLdStrnCmp
OsGetTempName
OsCreate
OsMuxLock
DbiFreeSQLRequest
OsLdLoadBySymbName
DbiGetSQLRequest
OsNmPrsFName
OsLdGetDefaultObj
OsGetTime
DbiGetObjFromName
SysYield
OsSwFree
SvAtoI
SvECvt
OsSwMalloc
OsFileLength
_OsFree
DbiDeleteTable
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
@__lockDebuggerData$qv
@__unlockDebuggerData$qv
DllEntryPoint
SqlDrvInit
__DebuggerHookData
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE