DllGetClassObject
EventStartup
Static task
static1
Behavioral task
behavioral1
Sample
1a6b5624c4980c16cd9bbab7f43b6fc9_JaffaCakes118.dll
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
1a6b5624c4980c16cd9bbab7f43b6fc9_JaffaCakes118.dll
Resource
win10v2004-20240508-en
Target
1a6b5624c4980c16cd9bbab7f43b6fc9_JaffaCakes118
Size
116KB
MD5
1a6b5624c4980c16cd9bbab7f43b6fc9
SHA1
90d1e1c775a54649045f655b7521191bc5097ea2
SHA256
d671d1faf7406faf323d080fac4458ec7070cd4a2ef2937b1cc3593f3127db8d
SHA512
3d2dd6f23fb9c94e6cab9ce4f9fcbec0f3a8fa7318e9c7c41e373544eca1da43aff03e05b82313868d44e464884067535c60919d0a9a0b019c85a05ef3bcabab
SSDEEP
3072:NUAnDb4v0tqDLOX6wAjpvbYagkTBfC9KPRQ3rss:NUun4vCE0jAVjjgkTBq4RQ7ss
Checks for missing Authenticode signature.
resource |
---|
1a6b5624c4980c16cd9bbab7f43b6fc9_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
_ui64toa
_atoi64
strncpy
strlen
_strnicmp
tolower
strstr
memcmp
memcpy
_snprintf
atoi
_itoa
_ultoa
_stricmp
_allmul
_chkstk
memset
_alldiv
strtok
closesocket
WSAStartup
WSARecv
WSASocketW
WSASend
WSAGetLastError
listen
WSAGetOverlappedResult
bind
setsockopt
shutdown
WSAWaitForMultipleEvents
WSASetLastError
getsockname
ntohs
ntohl
WSAIoctl
WSACreateEvent
HttpAddRequestHeadersA
HttpSendRequestA
InternetOpenA
HttpOpenRequestA
InternetConnectA
HttpQueryInfoA
InternetReadFile
InternetOpenUrlA
InternetCloseHandle
GetFileInformationByHandle
GetVolumeInformationA
GetWindowsDirectoryA
GetFileTime
HeapSetInformation
HeapFree
HeapAlloc
HeapCreate
HeapDestroy
GetVersionExA
LoadLibraryA
FreeLibrary
OpenFileMappingA
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
ExitProcess
GetFileAttributesExA
CreateEventA
TlsSetValue
TlsAlloc
TlsGetValue
CreateRemoteThread
Process32First
WriteProcessMemory
ProcessIdToSessionId
Process32Next
VirtualAllocEx
VirtualFreeEx
OpenProcess
GetFileAttributesA
DeleteFileA
GetTickCount
CreateProcessA
MultiByteToWideChar
GetCurrentThreadId
CloseHandle
GetCurrentProcessId
Thread32First
Thread32Next
GetProcAddress
OpenThread
InterlockedIncrement
GetModuleHandleA
InterlockedDecrement
CreateToolhelp32Snapshot
OpenMutexA
CreateThread
lstrcpyA
GetCurrentProcess
GetExitCodeThread
LeaveCriticalSection
OpenEventA
WaitForSingleObject
InterlockedCompareExchange
ReadFile
SetEvent
GetModuleFileNameW
WaitForMultipleObjects
lstrcatA
GetCurrentThread
VirtualFree
GetModuleFileNameA
FlushFileBuffers
CreateFileA
WriteFile
CreateMutexA
GetLastError
GetFileSize
lstrcmpiA
DuplicateHandle
InitializeCriticalSection
EnterCriticalSection
lstrlenA
ReleaseMutex
TerminateThread
lstrcmpW
SetUnhandledExceptionFilter
ResetEvent
SystemTimeToFileTime
GetSystemTime
GetLocalTime
Sleep
lstrcmpA
DeleteCriticalSection
SetFilePointer
SetEndOfFile
GetTempPathA
GetTempFileNameA
FlushInstructionCache
VirtualAlloc
VirtualProtect
GetThreadContext
SuspendThread
SetThreadContext
ResumeThread
VirtualQuery
SetLastError
GetSystemMetrics
wsprintfA
DispatchMessageA
PeekMessageA
ShowWindow
SetForegroundWindow
MsgWaitForMultipleObjects
ChangeServiceConfigA
ControlService
OpenSCManagerA
OpenServiceA
RegCreateKeyExA
RegOpenKeyExA
RegDeleteKeyA
RegEnumKeyExA
RegQueryInfoKeyA
RegCloseKey
RegQueryValueExA
RegSetValueExA
ShellExecuteA
CoUninitialize
CoInitializeEx
CoCreateInstance
SysAllocString
SysFreeString
DllGetClassObject
EventStartup
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ