DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
29b8c66619e14323a64864439e5d4379_JaffaCakes118.dll
Resource
win7-20240220-en
Target
29b8c66619e14323a64864439e5d4379_JaffaCakes118
Size
124KB
MD5
29b8c66619e14323a64864439e5d4379
SHA1
232ebce199fd0b1916eecf662bb997a445f7fa7d
SHA256
c415f1ea2f76592df32c3e2b7906612e8fa14bfdc77fe756c9d808b13707a38b
SHA512
1dd8052173ab34e1dacad2bbedc5bae63b317a9a9bb90e5948a7572527830ae0e3ae2309d41251460ea860e36b3eb5d93609a0b942ec509ec20f85be2b3f9387
SSDEEP
1536:1PqhuI6AGIHUibhT3aROp4d6qwBaxDTmisYHwFkWorDqKlpO92NcSgq64:1qcNvibhLM5OyQeWKbpO92NcSgH4
Checks for missing Authenticode signature.
resource |
---|
29b8c66619e14323a64864439e5d4379_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
InternetOpenA
InternetCloseHandle
InternetReadFile
InternetOpenUrlA
URLDownloadToFileA
ObtainUserAgentString
UrlMkSetSessionOption
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
InterlockedIncrement
InterlockedDecrement
MultiByteToWideChar
FreeLibrary
IsDBCSLeadByte
lstrcpynA
SizeofResource
LoadResource
FindResourceA
LoadLibraryExA
WideCharToMultiByte
lstrlenW
GetLastError
InterlockedExchange
GetACP
GetLocaleInfoA
GetThreadLocale
GetVersionExA
TerminateProcess
CloseHandle
Sleep
CreateMutexA
ReleaseMutex
lstrcpyW
lstrcatW
CreateProcessA
lstrcatA
LCMapStringW
LCMapStringA
LoadLibraryA
RtlUnwind
GetStringTypeW
GetStringTypeA
DisableThreadLibraryCalls
lstrcmpiA
lstrcpyA
lstrlenA
GetModuleFileNameA
ReadFile
IsBadCodePtr
FlushFileBuffers
RaiseException
SetUnhandledExceptionFilter
VirtualQuery
GetSystemInfo
VirtualProtect
SetFilePointer
GetCPInfo
GetTickCount
QueryPerformanceCounter
WriteFile
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
TlsAlloc
TlsGetValue
SetLastError
TlsFree
IsBadWritePtr
VirtualAlloc
GetOEMCP
IsBadReadPtr
SetStdHandle
HeapFree
HeapAlloc
HeapReAlloc
GetSystemTimeAsFileTime
GetCurrentThreadId
TlsSetValue
GetCommandLineA
ExitProcess
GetProcAddress
GetModuleHandleA
GetCurrentProcess
HeapSize
HeapDestroy
HeapCreate
VirtualFree
GetCurrentProcessId
KillTimer
CharNextA
SetTimer
wsprintfW
wsprintfA
RegEnumKeyExA
RegDeleteKeyA
RegOpenKeyA
RegDeleteValueA
RegCreateKeyExA
RegQueryInfoKeyA
RegSetValueExA
RegCreateKeyA
RegCloseKey
RegQueryValueExA
RegEnumKeyA
RegOpenKeyExA
ShellExecuteA
SHGetSpecialFolderPathA
CoTaskMemRealloc
CoCreateInstance
CoTaskMemFree
StringFromGUID2
CoTaskMemAlloc
SafeArrayDestroy
SafeArrayCreateVector
SafeArrayUnaccessData
SafeArrayGetUBound
SafeArrayGetLBound
SafeArrayAccessData
VarUI4FromStr
DispCallFunc
VariantClear
VariantInit
LoadTypeLi
LoadRegTypeLi
SysFreeString
SysStringLen
SysAllocString
UnRegisterTypeLi
RegisterTypeLi
PathFindExtensionA
InitCommonControlsEx
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ