DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
169952e5ae774aa8293a95decea795fd_JaffaCakes118.dll
Resource
win7-20240611-en
Target
169952e5ae774aa8293a95decea795fd_JaffaCakes118
Size
148KB
MD5
169952e5ae774aa8293a95decea795fd
SHA1
a23c33e368c8ef9aad197eb4ac44fddf692a61c3
SHA256
29eefbc4f3e905ed4c29f80f5314ddc0c239de3e374631f93db46c28f570249e
SHA512
50b2b19fb05a115ee2b3927b4a6b96709027edeba7c9ef6b6cdb3f8419c2af5611b773b426dcbdf544ec1122f20dfb1e43e55327ebbc6a5964548e349aa5f9be
SSDEEP
3072:Q9/FgE4b43PhFAEHt3u1MH4a5hMBU2bZOTlplqZJXeF:StPj9HH4a5hMLkmra
Checks for missing Authenticode signature.
resource |
---|
169952e5ae774aa8293a95decea795fd_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IsDBCSLeadByte
DeleteCriticalSection
LeaveCriticalSection
InterlockedIncrement
EnterCriticalSection
InterlockedDecrement
HeapDestroy
GetProcAddress
LoadLibraryA
lstrcpyA
lstrcatA
CreateThread
WaitForSingleObject
CloseHandle
GetCurrentThreadId
Sleep
CopyFileA
FindClose
FindNextFileA
DeleteFileA
FindFirstFileA
GetLocalTime
CreateDirectoryA
ReadFile
OpenFile
WriteFile
GetFileAttributesA
GetVersionExA
CreateFileA
WinExec
GetWindowsDirectoryA
InterlockedExchange
CompareStringW
CompareStringA
FlushFileBuffers
SetStdHandle
SetFilePointer
lstrcpynA
IsBadCodePtr
IsBadReadPtr
SetUnhandledExceptionFilter
GetStringTypeW
lstrcmpiA
LoadLibraryExA
GetLastError
FindResourceA
LoadResource
SizeofResource
FreeLibrary
WideCharToMultiByte
GetModuleHandleA
GetShortPathNameA
lstrlenA
MultiByteToWideChar
GetStringTypeA
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
HeapSize
GetCurrentProcess
TerminateProcess
IsBadWritePtr
VirtualAlloc
VirtualFree
HeapCreate
GetEnvironmentVariableA
RaiseException
TlsGetValue
SetLastError
TlsFree
TlsAlloc
TlsSetValue
LCMapStringW
LCMapStringA
ExitProcess
GetOEMCP
GetACP
GetCPInfo
GetVersion
GetCommandLineA
SetEnvironmentVariableA
GetSystemTime
GetTimeZoneInformation
HeapReAlloc
HeapAlloc
HeapFree
RtlUnwind
lstrlenW
InitializeCriticalSection
GetModuleFileNameA
DisableThreadLibraryCalls
wsprintfA
IsWindow
EnumThreadWindows
GetClassNameA
GetWindowTextA
FindWindowExA
AttachThreadInput
PostMessageA
UnhookWindowsHookEx
CharNextA
GetWindowThreadProcessId
GetForegroundWindow
RegQueryInfoKeyA
RegCreateKeyExA
RegDeleteValueA
RegCloseKey
RegCreateKeyA
RegQueryValueExA
RegEnumValueA
RegDeleteKeyA
RegSetValueExA
RegEnumKeyExA
RegOpenKeyExA
SHGetSpecialFolderPathA
CoCreateInstance
CoTaskMemRealloc
CoTaskMemAlloc
CoTaskMemFree
SysAllocString
SysFreeString
VarUI4FromStr
LoadTypeLi
RegisterTypeLi
LoadRegTypeLi
VariantChangeType
VariantClear
VariantCopy
SysStringLen
SysAllocStringLen
closesocket
inet_ntoa
ioctlsocket
inet_addr
htons
connect
WSAStartup
select
__WSAFDIsSet
WSACleanup
gethostbyname
InternetOpenUrlA
InternetReadFile
InternetSetCookieExA
InternetCloseHandle
InternetOpenA
InternetQueryDataAvailable
NetWkstaTransportEnum
NetApiBufferFree
StrStrIA
GetAdaptersInfo
UuidCreateSequential
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ