DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
RunAtl
Static task
static1
Behavioral task
behavioral1
Sample
1b8b585181e400c49264e2ceed04adb2_JaffaCakes118.dll
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
1b8b585181e400c49264e2ceed04adb2_JaffaCakes118.dll
Resource
win10v2004-20240508-en
Target
1b8b585181e400c49264e2ceed04adb2_JaffaCakes118
Size
51KB
MD5
1b8b585181e400c49264e2ceed04adb2
SHA1
b32e23c3e02b045923f374e2512e645b0710662c
SHA256
884256de1616166eb3a8e8197eb40ed90422f4df6437e394df9896535e26ebf9
SHA512
247cb305cd115c8cbb2f78e34f671d9cb0784ebec5a88bd9f162080d5995fd65f2c966bd2dfd4b2076eb7eb1334ae2e32f73bd82857f8eadbe580dd7dbc3a855
SSDEEP
768:aSr5WdU3ZpoXWX07RMB5Jza5NPHMVQlp/:aSr5WdiLX2m7JUNUV4p/
Checks for missing Authenticode signature.
resource |
---|
1b8b585181e400c49264e2ceed04adb2_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
InternetOpenUrlA
InternetCloseHandle
HttpQueryInfoA
InternetGetConnectedState
InternetOpenA
InternetReadFile
timeGetTime
ord1255
ord1578
ord1253
ord826
ord269
ord1570
ord823
ord6467
ord1131
ord2725
ord3953
ord561
ord3738
ord4424
ord4622
ord4080
ord3079
ord3825
ord3831
ord3830
ord2976
ord3081
ord2985
ord3262
ord3136
ord4465
ord3259
ord1116
ord3147
ord2982
ord5714
ord5289
ord5307
ord4698
ord4079
ord5302
ord5300
ord3346
ord2396
ord5199
ord1089
ord3922
ord5731
ord2512
ord2554
ord4486
ord6375
ord815
ord4274
ord860
ord535
ord2818
ord939
ord825
ord540
ord537
ord858
ord800
ord1197
ord1243
ord342
ord1182
ord1577
ord1168
ord1575
ord1176
ord600
atol
_mbscmp
__CxxFrameHandler
strcat
??1type_info@@UAE@XZ
_adjust_fdiv
_initterm
_onexit
__dllonexit
?terminate@@YAXXZ
_except_handler3
memcmp
realloc
malloc
free
_purecall
strcpy
memcpy
strlen
sprintf
memset
lstrcpyA
HeapDestroy
IsDBCSLeadByte
lstrcpynA
lstrcmpiA
LoadLibraryExA
GetLastError
FindResourceA
LoadResource
SizeofResource
FreeLibrary
WideCharToMultiByte
GetModuleFileNameA
GetModuleHandleA
GetShortPathNameA
MultiByteToWideChar
lstrlenW
lstrcatA
EnterCriticalSection
InterlockedIncrement
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
CreateThread
CreateMutexA
WinExec
lstrlenA
Sleep
DeleteFileA
GetWindowsDirectoryA
LoadLibraryA
GetProcAddress
OutputDebugStringA
LocalFree
InterlockedDecrement
FindFirstFileA
LocalAlloc
CharNextA
RegQueryValueExA
RegEnumValueA
RegQueryInfoKeyA
RegSetValueExA
RegEnumKeyExA
RegOpenKeyExA
RegCloseKey
RegDeleteValueA
RegCreateKeyExA
RegDeleteKeyA
CoTaskMemFree
CoTaskMemAlloc
CoTaskMemRealloc
CoCreateInstance
SysStringLen
LoadRegTypeLi
SysFreeString
VarUI4FromStr
SysAllocString
LoadTypeLi
RegisterTypeLi
URLDownloadToFileA
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
RunAtl
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ