DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
0dbb890550758d7c93477282eafdad09_JaffaCakes118.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0dbb890550758d7c93477282eafdad09_JaffaCakes118.dll
Resource
win10v2004-20240508-en
Target
0dbb890550758d7c93477282eafdad09_JaffaCakes118
Size
196KB
MD5
0dbb890550758d7c93477282eafdad09
SHA1
4aea57135d7bf3c3ef43bda2df32d879af683af3
SHA256
68b2630d01d89f2ee03ffe75fdaa9e221b0a3ced385fe8f158fb0763d0dfddb2
SHA512
ac294246ec8e988f670fc92e209423d10f70cece467d50a194a909017856ba9d405ed960968aa38815e223c83ddb00ebda758260e5bc086960a5cbe2bc623586
SSDEEP
3072:Ptl/wnP+YUaxa/ka0eNYgRGiAroM+M8yD4cdLUX/SGtVMFpy:D4nWYvM/ka0eNYgRRAYjyDtHqMz
Checks for missing Authenticode signature.
resource |
---|
0dbb890550758d7c93477282eafdad09_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
ImageList_SetBkColor
ImageList_ReplaceIcon
ImageList_Create
ImageList_Destroy
GetLastError
FreeLibrary
MultiByteToWideChar
SizeofResource
LoadResource
FindResourceW
LoadLibraryExW
lstrcmpiW
DeleteCriticalSection
RaiseException
LeaveCriticalSection
EnterCriticalSection
GetCurrentThreadId
FlushInstructionCache
lstrlenW
SetLastError
FlushFileBuffers
CloseHandle
CreateFileA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
GetConsoleMode
GetConsoleCP
SetFilePointer
GetModuleHandleW
InterlockedIncrement
InitializeCriticalSection
DisableThreadLibraryCalls
GetModuleFileNameW
InterlockedDecrement
LoadLibraryW
GetProcAddress
GetCurrentProcess
GetStringTypeW
GetStringTypeA
VirtualQuery
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
GetVersionExA
InterlockedCompareExchange
HeapFree
GetProcessHeap
HeapAlloc
LoadLibraryA
IsProcessorFeaturePresent
VirtualFree
VirtualAlloc
InterlockedExchange
GetACP
GetLocaleInfoA
GetThreadLocale
LocalFree
RtlUnwind
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapReAlloc
GetCommandLineA
GetModuleHandleA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
DebugBreak
WideCharToMultiByte
Sleep
HeapSize
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
GetCPInfo
GetOEMCP
LCMapStringA
LCMapStringW
HeapDestroy
HeapCreate
SetHandleCount
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
SetWindowLongW
ShowWindow
RegisterClassExW
UnregisterClassA
GetClassInfoExW
CreateWindowExW
GetClientRect
CharNextW
CallWindowProcW
GetWindowLongW
LoadCursorW
DestroyWindow
DefWindowProcW
IsWindow
GetSysColor
SendMessageW
RegDeleteValueW
RegDeleteKeyW
RegCloseKey
RegCreateKeyExW
RegQueryInfoKeyW
RegEnumKeyExW
RegOpenKeyExW
RegSetValueExW
CoTaskMemRealloc
StringFromGUID2
CoCreateInstance
CoTaskMemFree
CoTaskMemAlloc
UnRegisterTypeLi
RegisterTypeLi
SysStringLen
LoadTypeLi
LoadRegTypeLi
VarUI4FromStr
SysFreeString
SysAllocString
VariantInit
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ