DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Register
Uninstall
Static task
static1
Behavioral task
behavioral1
Sample
258b20ce6d60ea12e5336b7f1b9b31ec_JaffaCakes118.dll
Resource
win7-20240611-en
Target
258b20ce6d60ea12e5336b7f1b9b31ec_JaffaCakes118
Size
171KB
MD5
258b20ce6d60ea12e5336b7f1b9b31ec
SHA1
8cf46fc50aa0b2445e2e65adb927952c9032cec7
SHA256
deede0032f3df90391c76429197ec7164ce9a8e4bb4629678bacc14e265bf1c3
SHA512
0fdea172bc803cca9383b4d32b6270bcddb0e26b22207898709669e7426440d43eb3ee405071b460241dd812bc4ae7d17b3a89f64f5e6950df85b3ba79192984
SSDEEP
3072:AfJDgQ+t0TlbkzbTP32YDoD75FoIvum+wwBan8ZgTJrG2i/RT5aN31Tq2K2atHVh:CgQHkzXmd9sBan8ZgJZipTkNFRK3Kxju
Checks for missing Authenticode signature.
resource |
---|
258b20ce6d60ea12e5336b7f1b9b31ec_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
SHSetValueA
SHDeleteKeyA
PathAppendA
PathFileExistsA
SHDeleteValueA
PathFindFileNameA
SHGetValueA
PathStripToRootA
StrStrIA
PathIsUNCA
PathFindExtensionA
PathRemoveExtensionA
PathRemoveFileSpecA
PathRemoveBlanksA
PathRemoveBackslashA
lstrcmpA
CreateMutexA
OpenMutexA
CreateThread
Sleep
SetThreadPriority
LoadLibraryA
InitializeCriticalSection
DeleteCriticalSection
MapViewOfFile
CreateFileMappingA
OpenFileMappingA
UnmapViewOfFile
GetLastError
EnterCriticalSection
ReadFile
GetFileSize
CreateFileA
GetShortPathNameA
GetLongPathNameA
GetSystemDirectoryA
GetWindowsDirectoryA
lstrcpynA
lstrlenW
GetTickCount
FindClose
FindNextFileA
FindFirstFileA
LoadLibraryExA
SetLastError
GetModuleFileNameA
CopyFileA
ReadProcessMemory
FreeLibrary
DeleteFileA
VirtualQuery
lstrcmpiA
VirtualProtect
WriteProcessMemory
GetCurrentProcessId
Module32First
Module32Next
GetModuleHandleA
GetCurrentProcess
FlushInstructionCache
GetSystemInfo
lstrlenA
MultiByteToWideChar
WaitForSingleObject
TerminateThread
CloseHandle
WideCharToMultiByte
GetModuleFileNameW
LoadLibraryW
CreateToolhelp32Snapshot
GetModuleHandleW
OutputDebugStringA
GetVersionExA
GetFileAttributesW
GlobalSize
GetProcAddress
GetVersion
lstrcatA
lstrcpyA
IsBadStringPtrA
GlobalLock
LeaveCriticalSection
LocalFree
GetPrivateProfileStringA
IsBadStringPtrW
TlsGetValue
TlsSetValue
GetCurrentThreadId
TlsFree
TlsAlloc
WritePrivateProfileSectionA
DeviceIoControl
GetPrivateProfileIntA
WritePrivateProfileStringA
MoveFileExA
WriteFile
WritePrivateProfileStructA
GetTempPathA
InterlockedIncrement
InterlockedDecrement
InterlockedExchange
IsDebuggerPresent
GetACP
CreateProcessA
GetPrivateProfileStructA
GetPropA
RegisterWindowMessageA
GetClassNameA
SendMessageA
SetWindowTextA
IsWindow
GetParent
EnumWindows
MessageBoxA
SetWindowsHookExA
InvalidateRect
ReleaseDC
DrawTextA
GetWindowTextA
FillRect
GetSysColor
GetDC
GetFocus
GetKeyState
GetWindowLongW
SetWindowLongW
GetComboBoxInfo
DrawFocusRect
UnhookWindowsHookEx
CallNextHookEx
GetWindowThreadProcessId
IsWindowVisible
DialogBoxParamA
GetWindow
GetWindowRect
SystemParametersInfoA
GetClientRect
MapWindowPoints
SetWindowPos
GetDlgItemTextA
EndDialog
GetWindowTextLengthA
GetDlgItem
EnableWindow
LoadStringA
EnumChildWindows
SendMessageTimeoutA
WindowFromPoint
DefWindowProcA
CallWindowProcA
FindWindowExA
GetWindowLongA
SetPropA
SetWindowLongA
RemovePropA
RegQueryValueExA
RegDeleteValueA
RegCreateKeyExA
RegSetValueA
RegCreateKeyA
RegSetValueExA
RegOpenKeyA
QueryServiceStatus
RegEnumKeyExA
RegCloseKey
CloseServiceHandle
OpenSCManagerA
DeleteService
OpenServiceA
ControlService
RegOpenKeyExA
RevokeDragDrop
RegisterDragDrop
CoCreateGuid
StringFromCLSID
CoTaskMemFree
CoInitialize
CoUninitialize
ReleaseStgMedium
VariantClear
SysAllocString
SysFreeString
ImageDirectoryEntryToData
_mbsrchr
bsearch
fclose
fgets
fopen
_mbclen
_ismbcdigit
atoi
_vsnprintf
_mbsnbcpy
_CxxThrowException
fwrite
rand
srand
time
fread
??1type_info@@UAE@XZ
fseek
ftell
fputs
strstr
rewind
wcslen
strrchr
_wcsicmp
_tempnam
atol
_ltoa
_mbstok
__dllonexit
_onexit
_initterm
_adjust_fdiv
free
_snprintf
realloc
_mbslwr
_mbsstr
_mbschr
_mbsnbicmp
_mbscmp
sprintf
_purecall
wcscpy
_mbsicmp
__CxxFrameHandler
??2@YAPAXI@Z
??3@YAXPAX@Z
_except_handler3
tmpnam
_stricmp
_strlwr
_itoa
malloc
IsValidURL
URLDownloadToFileA
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
send
gethostbyname
setsockopt
socket
inet_addr
WSAStartup
WSACleanup
closesocket
recv
inet_ntoa
htons
connect
WSAGetLastError
SetBkMode
GetStockObject
DeleteObject
CreateSolidBrush
SetTextColor
GetTextExtentPointA
SetPixel
LineTo
MoveToEx
CreatePen
SetBkColor
SelectObject
SHGetMalloc
SHGetSpecialFolderLocation
SHGetDesktopFolder
ShellExecuteA
SHGetSpecialFolderPathA
InternetCrackUrlA
DeleteUrlCacheEntry
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Register
Uninstall
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ