DllGetClassObject
EventStartup
Static task
static1
Behavioral task
behavioral1
Sample
0e29c880b4d9221037d4a2fecf363b1b_JaffaCakes118.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0e29c880b4d9221037d4a2fecf363b1b_JaffaCakes118.dll
Resource
win10v2004-20240508-en
Target
0e29c880b4d9221037d4a2fecf363b1b_JaffaCakes118
Size
120KB
MD5
0e29c880b4d9221037d4a2fecf363b1b
SHA1
14e8cd0731c11ee615c1408bb1ea2030045741a5
SHA256
234d97334d649a74ecfba93968e690244d55dfc840accb8e62c30369dd2a13f4
SHA512
e0ba32562b46e54e582a1fee10035982c54ee473b0699c9c040e46d65b1927a6498e4b272cbc985cbd0b74b733307e1af5c2dd44beab260a1d6f4bcc89c6e0e3
SSDEEP
3072:A8sD7d7bONC5/LoCC552y32tTBfCspEqr3Mx+:A8C7aAMCCrLmtTBq4E+3Mx+
Checks for missing Authenticode signature.
resource |
---|
0e29c880b4d9221037d4a2fecf363b1b_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
_ui64toa
_atoi64
strncpy
strlen
_strnicmp
tolower
strstr
memcmp
memcpy
_snprintf
atoi
_itoa
_ultoa
_stricmp
_allmul
_chkstk
memset
_alldiv
strtok
closesocket
WSAStartup
WSARecv
WSASocketW
WSASend
WSAGetLastError
listen
WSAGetOverlappedResult
bind
setsockopt
shutdown
WSAWaitForMultipleEvents
WSASetLastError
getsockname
ntohs
ntohl
WSAIoctl
WSACreateEvent
HttpAddRequestHeadersA
HttpSendRequestA
InternetOpenA
HttpOpenRequestA
InternetConnectA
HttpQueryInfoA
InternetReadFile
InternetOpenUrlA
InternetCloseHandle
SystemTimeToFileTime
GetVolumeInformationA
GetFileTime
HeapSetInformation
HeapFree
HeapAlloc
HeapCreate
HeapDestroy
GetVersionExA
LoadLibraryA
FreeLibrary
OpenFileMappingA
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
ExitProcess
GetFileAttributesExA
GetWindowsDirectoryA
CreateEventA
TlsSetValue
TlsAlloc
TlsGetValue
CreateRemoteThread
Process32First
WriteProcessMemory
ProcessIdToSessionId
Process32Next
VirtualAllocEx
VirtualFreeEx
GetCurrentThreadId
CloseHandle
GetCurrentProcessId
Thread32First
Thread32Next
GetProcAddress
OpenThread
InterlockedIncrement
GetModuleHandleA
InterlockedDecrement
CreateToolhelp32Snapshot
OpenMutexA
CreateThread
lstrcpyA
GetCurrentProcess
GetExitCodeThread
LeaveCriticalSection
OpenEventA
WaitForSingleObject
InterlockedCompareExchange
ReadFile
SetEvent
GetModuleFileNameW
WaitForMultipleObjects
lstrcatA
GetCurrentThread
VirtualFree
GetModuleFileNameA
FlushFileBuffers
CreateFileA
WriteFile
CreateMutexA
GetLastError
GetFileSize
lstrcmpiA
DuplicateHandle
InitializeCriticalSection
EnterCriticalSection
lstrlenA
ReleaseMutex
TerminateThread
GetFileInformationByHandle
SetUnhandledExceptionFilter
ResetEvent
OpenProcess
GetSystemTime
GetLocalTime
Sleep
lstrcmpA
DeleteCriticalSection
SetFilePointer
SetEndOfFile
GetTempPathA
GetTempFileNameA
FlushInstructionCache
VirtualAlloc
VirtualProtect
GetThreadContext
SuspendThread
SetThreadContext
ResumeThread
VirtualQuery
SetLastError
lstrcmpW
MultiByteToWideChar
CreateProcessA
GetTickCount
DeleteFileA
GetFileAttributesA
GetSystemMetrics
wsprintfA
DispatchMessageA
PeekMessageA
ShowWindow
SetForegroundWindow
MsgWaitForMultipleObjects
ChangeServiceConfigA
ControlService
OpenSCManagerA
OpenServiceA
RegCreateKeyExA
RegOpenKeyExA
RegDeleteKeyA
RegEnumKeyExA
RegQueryInfoKeyA
RegCloseKey
RegQueryValueExA
RegSetValueExA
ShellExecuteA
CoUninitialize
CoInitializeEx
CoCreateInstance
SysAllocString
SysFreeString
DllGetClassObject
EventStartup
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ