DllCanUnloadNow
DllGetClassObject
DllMain
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
0e9b485b68078d49e1b4c1c448568a1b_JaffaCakes118.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0e9b485b68078d49e1b4c1c448568a1b_JaffaCakes118.dll
Resource
win10v2004-20240508-en
Target
0e9b485b68078d49e1b4c1c448568a1b_JaffaCakes118
Size
101KB
MD5
0e9b485b68078d49e1b4c1c448568a1b
SHA1
d300d1ff16c91565f458bb7ace9ba340326bde7e
SHA256
4fff2719abce75aad8c533519ac54a8e2b31ecac3fed6b4e4a19bce1d9e22551
SHA512
f9c4571281eb8d3ac4644de667470d5350ddc12e6b3a483d3c8b809fd60c4004054f43253443de0ff5304e938e31b0e5285af98c23414c123ada2114f8730e2e
SSDEEP
3072:al8vrAeOJQ4aB34DbFP9jI/PgbhVLGDh/ByRz:aswABMl5brSh/8
Checks for missing Authenticode signature.
resource |
---|
0e9b485b68078d49e1b4c1c448568a1b_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
lstrcpyA
lstrlenW
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
WideCharToMultiByte
InterlockedExchange
GetACP
GetLocaleInfoA
GetThreadLocale
CloseHandle
OpenMutexA
LocalFree
CreateEventA
OpenEventA
lstrcatA
GlobalLock
GetCurrentDirectoryA
SetCurrentDirectoryA
GlobalUnlock
lstrcpynW
WriteProcessMemory
GetCurrentProcess
VirtualProtect
SetLastError
FindResourceW
FindResourceExW
HeapDestroy
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
GetProcessHeap
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
ExitProcess
GetLastError
MultiByteToWideChar
RaiseException
GetModuleFileNameA
GetModuleHandleA
lstrlenA
InterlockedDecrement
InterlockedIncrement
LockResource
SizeofResource
FindResourceExA
LoadResource
FindResourceA
GetVersionExA
IsDBCSLeadByte
lstrcpynA
lstrcmpiA
WaitForSingleObject
SendMessageA
InsertMenuA
SetMenuItemBitmaps
GetDC
ReleaseDC
GetDesktopWindow
CreateIconFromResourceEx
LookupIconIdFromDirectoryEx
CopyImage
LoadStringA
LoadStringW
LoadBitmapA
LoadBitmapW
LoadIconA
LoadIconW
LoadCursorA
LoadCursorW
LoadImageA
LoadImageW
CharNextA
FindWindowA
RegEnumKeyExA
RegCreateKeyExA
RegSetValueExA
RegDeleteValueA
RegDeleteKeyA
RegCloseKey
RegQueryInfoKeyA
RegOpenKeyExA
RegQueryValueExA
OleRun
CoCreateInstance
StringFromGUID2
ReleaseStgMedium
StringFromCLSID
CoUninitialize
CoInitialize
CoTaskMemFree
ShellExecuteA
DragQueryFileA
SHGetFileInfoA
SafeArrayDestroy
SafeArrayUnlock
SafeArrayLock
VarUI4FromStr
SysAllocString
SysStringLen
SysFreeString
LoadRegTypeLi
RegisterTypeLi
UnRegisterTypeLi
LoadTypeLi
SafeArrayGetLBound
VariantInit
VariantCopy
VariantClear
VariantChangeType
SafeArrayGetUBound
GetErrorInfo
SHDeleteKeyA
PathRenameExtensionA
PathFindExtensionA
PathCombineA
CreateDIBitmap
DeleteObject
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_Nomemory@std@@YAXXZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
_purecall
??0exception@@QAE@ABV0@@Z
_resetstkoflw
malloc
wcsncpy
realloc
free
??_V@YAXPAX@Z
??3@YAXPAX@Z
memmove
_mbschr
_beginthreadex
_mbsrchr
??1exception@@UAE@XZ
??0exception@@QAE@XZ
__CxxFrameHandler
_except_handler3
_CxxThrowException
_vscprintf
vsprintf
_mbscmp
wcslen
_vscwprintf
vswprintf
memset
_callnewh
__dllonexit
_onexit
__security_error_handler
__CppXcptFilter
_adjust_fdiv
_initterm
??1type_info@@UAE@XZ
?terminate@@YAXXZ
ImageDirectoryEntryToData
DllCanUnloadNow
DllGetClassObject
DllMain
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ