DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
RunIE
Static task
static1
Behavioral task
behavioral1
Sample
14ce86d71ef6ad0196e3f9d25cddceac_JaffaCakes118.dll
Resource
win7-20240508-en
Target
14ce86d71ef6ad0196e3f9d25cddceac_JaffaCakes118
Size
84KB
MD5
14ce86d71ef6ad0196e3f9d25cddceac
SHA1
a78b6776d667907372496db3756b3dc6dad4c303
SHA256
a491fa74c25ddbcd02e05731ac312f487a77323cbe83fc9daf27c683431c5d45
SHA512
cdd36f352661415f6063d8e2b0ae5b39ebfc9df6ad442f864ed1b7db1e68bbba51bc0cb4281949ae5c4cced1517ce09e48b654173b7e141e187100aeb93e7a8a
SSDEEP
1536:tJIBWDfol/JCu5BDy9Bh1YOxaTGhmmH/elvEO19NQQr6cnKFw/jYF0sp8SZ21bPL:tmBWDfQJCu5BDy9Bh1YOxaTGhmmH/el9
Checks for missing Authenticode signature.
resource |
---|
14ce86d71ef6ad0196e3f9d25cddceac_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
MultiByteToWideChar
lstrlenW
lstrlenA
DeleteCriticalSection
InterlockedIncrement
InterlockedDecrement
CreateMutexA
CreateEventA
GetVersionExA
OpenMutexA
WaitForSingleObject
SetEvent
InitializeCriticalSection
LeaveCriticalSection
MapViewOfFile
CreateFileMappingA
EnterCriticalSection
UnmapViewOfFile
DeviceIoControl
FreeLibrary
GetTickCount
GetProcAddress
LoadLibraryA
GetVolumeInformationA
CreateProcessA
WideCharToMultiByte
VirtualProtect
IsBadReadPtr
GetVersion
GetModuleHandleA
IsBadCodePtr
Module32Next
Module32First
CreateToolhelp32Snapshot
GetCurrentProcessId
DisableThreadLibraryCalls
HeapDestroy
GetShortPathNameA
CreateThread
GetCurrentThreadId
CloseHandle
CreateFileA
SetFilePointer
ReadFile
SetLastError
GetModuleFileNameA
GetEnvironmentVariableA
GetLastError
GetClassNameA
EnumThreadWindows
IsWindow
SetSecurityDescriptorDacl
RegQueryValueExA
RegCloseKey
InitializeSecurityDescriptor
RegSetValueExA
RegCreateKeyExA
RegOpenKeyExA
CoCreateInstance
CoInitializeEx
CoUninitialize
SysStringLen
LoadRegTypeLi
SysAllocStringLen
SysFreeString
IsValidURL
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ID@Z
?_Freeze@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
??Hstd@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@ABV10@PBD@Z
?compare@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEHIIPBDI@Z
?find@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDII@Z
?substr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBE?AV12@II@Z
?find_first_of@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDII@Z
??Hstd@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@PBDABV10@@Z
??Mstd@@YA_NABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@0@Z
??0_Lockit@std@@QAE@XZ
??1_Lockit@std@@QAE@XZ
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
??Hstd@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@ABV10@0@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
SHGetSpecialFolderPathA
_purecall
memcmp
rand
_strcmpi
srand
?terminate@@YAXXZ
__dllonexit
_onexit
_initterm
_strdup
_strlwr
_adjust_fdiv
strstr
_strnicmp
__CxxFrameHandler
strlen
??2@YAPAXI@Z
strcpy
memset
sprintf
memcpy
div
malloc
strcat
strncpy
wcslen
free
_stricmp
_except_handler3
strncat
SnmpUtilOidCpy
PathFileExistsA
SHDeleteKeyA
PathGetDriveNumberA
InternetReadFile
InternetOpenUrlA
InternetQueryDataAvailable
InternetCanonicalizeUrlA
InternetCloseHandle
InternetOpenA
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
RunIE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ