DllGetClassObject
EventStartup
Static task
static1
Behavioral task
behavioral1
Sample
19c6d27666e5dd4059b7ed8ecaf575d2_JaffaCakes118.dll
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
19c6d27666e5dd4059b7ed8ecaf575d2_JaffaCakes118.dll
Resource
win10v2004-20240611-en
Target
19c6d27666e5dd4059b7ed8ecaf575d2_JaffaCakes118
Size
132KB
MD5
19c6d27666e5dd4059b7ed8ecaf575d2
SHA1
c91f71ed73a970343e6db4d06af7786d36717583
SHA256
0690508af601b4097a7fcbc3424de3db7626a64fb1fc7296b591342c723c3e2f
SHA512
2160080c12fa4e7f435da8fe27935b8813a5469107e2e99d7d0d9694f98f483b7af259e1b54211fabb3b860c151f8718ce3832b14a531603ed661dd120835de5
SSDEEP
3072:+DlMNMg4ObUna00gHgwTuAqFBALTBfCK2Wj5LGT:iMNyObUnaS8BALTBqtWj8T
Checks for missing Authenticode signature.
resource |
---|
19c6d27666e5dd4059b7ed8ecaf575d2_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
_snprintf
strlen
_strnicmp
strstr
_stricmp
memcmp
atoi
_itoa
memcpy
_ultoa
tolower
memset
_chkstk
_allmul
_alldiv
strtok
closesocket
WSASocketW
listen
WSASend
WSAGetLastError
WSAWaitForMultipleEvents
WSAIoctl
setsockopt
WSARecv
shutdown
WSAGetOverlappedResult
WSAStartup
ntohl
WSASetLastError
getsockname
ntohs
WSACreateEvent
bind
HttpOpenRequestA
HttpSendRequestA
HttpQueryInfoA
InternetOpenA
InternetReadFile
InternetOpenUrlA
InternetCloseHandle
InternetConnectA
InternetSetOptionA
HttpAddRequestHeadersA
SysAllocString
SysFreeString
PathFileExistsA
WaitForMultipleObjects
GetWindowsDirectoryA
GetFileTime
GetVolumeInformationA
GetSystemDirectoryA
GetVersionExA
FindClose
RemoveDirectoryA
TransactNamedPipe
HeapSetInformation
HeapCreate
FindFirstFileA
HeapDestroy
HeapFree
WaitNamedPipeA
FindNextFileA
SetNamedPipeHandleState
HeapAlloc
FreeLibrary
OpenFileMappingA
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
ExitProcess
GetFileAttributesExA
SetFileAttributesA
CreateDirectoryA
InterlockedExchange
CreateEventA
TlsSetValue
TlsGetValue
TlsAlloc
ProcessIdToSessionId
Process32Next
Process32First
WriteProcessMemory
VirtualAllocEx
Thread32Next
GetModuleHandleA
Thread32First
CreateToolhelp32Snapshot
InterlockedIncrement
InterlockedDecrement
GetCurrentThreadId
GetProcAddress
CloseHandle
OpenThread
GetCurrentProcessId
GetFileSize
lstrcpyA
ReadFile
GetModuleFileNameA
GetModuleFileNameW
InitializeCriticalSection
ResetEvent
lstrcatA
GetLocalTime
WaitForSingleObject
OpenMutexA
InterlockedCompareExchange
lstrlenA
CreateMutexA
SetEvent
TerminateThread
Sleep
OutputDebugStringA
DuplicateHandle
GetExitCodeThread
FlushFileBuffers
ReleaseMutex
OpenEventA
SetUnhandledExceptionFilter
LeaveCriticalSection
GetCurrentThread
VirtualFree
GetLastError
GetFileInformationByHandle
SystemTimeToFileTime
lstrcmpiA
GetSystemTime
GetCurrentProcess
WriteFile
EnterCriticalSection
CreateFileA
CreateThread
VirtualFreeEx
DisconnectNamedPipe
CreateNamedPipeA
ConnectNamedPipe
PeekNamedPipe
lstrcmpA
SetFilePointer
SetEndOfFile
GetTempFileNameA
DeleteCriticalSection
GetTempPathA
VirtualQuery
VirtualAlloc
SuspendThread
ResumeThread
GetThreadContext
SetThreadContext
VirtualProtect
FlushInstructionCache
SetLastError
lstrcmpW
MultiByteToWideChar
DeleteFileA
CreateProcessA
GetTickCount
GetFileAttributesA
LoadLibraryA
CreateRemoteThread
OpenProcess
SetForegroundWindow
ShowWindow
PeekMessageA
WaitForInputIdle
MsgWaitForMultipleObjects
GetSystemMetrics
wsprintfA
DispatchMessageA
OpenSCManagerA
CloseServiceHandle
OpenServiceA
ControlService
ChangeServiceConfigA
RegDeleteKeyA
RegQueryValueExA
RegCreateKeyExA
RegQueryInfoKeyA
RegEnumKeyExA
RegSetValueExA
RegCloseKey
RegOpenKeyExA
ShellExecuteA
SHGetFolderPathA
CoUninitialize
CoInitializeEx
CoCreateInstance
DllGetClassObject
EventStartup
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ