DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Rundll32
Rundll32_
Static task
static1
Behavioral task
behavioral1
Sample
2be23af87a5500f0670dd0833a1bb9fd_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2be23af87a5500f0670dd0833a1bb9fd_JaffaCakes118.dll
Resource
win10v2004-20240704-en
Target
2be23af87a5500f0670dd0833a1bb9fd_JaffaCakes118
Size
114KB
MD5
2be23af87a5500f0670dd0833a1bb9fd
SHA1
2d10063af63d180c1eaf9e2e27684eb4a9cc0a6f
SHA256
5c47b93a67a000073a2b8017e29de5ccbf6f46c47dd9d6c5968d42e1bcf376b7
SHA512
ba0faee6977037d3904121f01b04bab3961e16a53f39fe9c2050972774337ec9788b9b7fbbe787af3f75a4495dd20f7fca0025fdc5d58d39a26c9e9dfd89445e
SSDEEP
1536:p/2f5hBdoYScdpkrqSBPU7yyQ3w7NnJ/vrW/ZXwc1Rk+XCO:p/85h0YScDk3PU7vrW/ZXwc1Rk8CO
Checks for missing Authenticode signature.
resource |
---|
2be23af87a5500f0670dd0833a1bb9fd_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
TlsGetValue
SystemTimeToFileTime
GetSystemTime
lstrlenA
IsBadWritePtr
TlsAlloc
TlsFree
TlsSetValue
GetLastError
CreateMutexA
GetModuleFileNameW
lstrcpynA
GetVersionExA
LoadLibraryA
MapViewOfFile
CreateFileMappingA
GetCommandLineA
UnmapViewOfFile
LeaveCriticalSection
EnterCriticalSection
ReadFile
GetFileSize
CreateFileA
GetShortPathNameA
GetLongPathNameA
GetWindowsDirectoryA
OpenMutexA
lstrcmpA
Sleep
CreateProcessA
CopyFileA
Process32Next
Process32First
SetLastError
WideCharToMultiByte
MultiByteToWideChar
OpenProcess
lstrlenW
VirtualAllocEx
CreateRemoteThread
GetExitCodeThread
VirtualFreeEx
DeleteCriticalSection
InitializeCriticalSection
WaitForMultipleObjects
SetEvent
CreateEventA
CreateThread
WaitForSingleObject
TerminateThread
CreateToolhelp32Snapshot
GetModuleFileNameA
GetSystemDirectoryA
LoadLibraryExA
ReadProcessMemory
FreeLibrary
VirtualQuery
lstrcmpiA
GetVersion
VirtualProtect
WriteProcessMemory
GetCurrentProcessId
Module32First
Module32Next
CloseHandle
GetModuleHandleA
GetCurrentProcess
FlushInstructionCache
GetSystemInfo
GetProcAddress
OpenFileMappingA
WritePrivateProfileSectionA
MoveFileExA
WriteFile
GetPrivateProfileStructA
GetTempPathA
GetPrivateProfileIntA
WritePrivateProfileStructA
lstrcatA
FindFirstFileA
FindNextFileA
FindClose
lstrcpyA
DeviceIoControl
GetTickCount
InterlockedDecrement
LoadLibraryW
IsDebuggerPresent
GetACP
DeleteFileA
RegisterWindowMessageA
GetMessageA
TranslateMessage
DispatchMessageA
FindWindowA
PostMessageA
DefWindowProcA
GetWindowLongA
wsprintfA
FindWindowExA
GetClassNameA
SetWindowLongA
IsWindow
CreateWindowExA
GetWindowThreadProcessId
SetWindowsHookExA
SetWindowsHookExW
SetTimer
EnumWindows
SendMessageA
GetParent
GetWindowTextA
CallNextHookEx
UnhookWindowsHookEx
KillTimer
DestroyWindow
PostQuitMessage
GetClassInfoExA
RegisterClassExA
GetStockObject
RegQueryValueExA
RegDeleteValueA
RegOpenKeyA
RegEnumKeyExA
RegEnumKeyA
RegEnumValueA
RegCloseKey
RegNotifyChangeKeyValue
RegOpenKeyExA
RegQueryValueExW
RegSetValueExA
RegCreateKeyExA
CloseServiceHandle
CreateServiceA
OpenSCManagerA
DeleteService
OpenServiceA
QueryServiceStatus
StartServiceA
ControlService
RegSetValueExW
RegOpenKeyExW
CoTaskMemFree
StringFromCLSID
SysFreeString
SysAllocString
PathRemoveBlanksA
PathAppendA
PathFileExistsA
StrStrIA
SHSetValueA
SHDeleteValueA
SHDeleteKeyA
PathFindExtensionA
PathStripToRootA
PathFindFileNameA
PathRemoveBackslashA
PathRemoveFileSpecA
PathRemoveExtensionA
SHGetValueA
ImageDirectoryEntryToData
_mbsicmp
rand
wcscpy
sprintf
_mbsnbicmp
_mbschr
srand
time
_mbscmp
_mbsnbcpy
_snprintf
fclose
fwrite
fopen
sscanf
_tempnam
wcslen
_wcsicmp
tmpnam
fseek
fputs
strstr
fgets
rewind
strrchr
strchr
fread
ftell
malloc
_strnicmp
strncpy
_stricmp
_except_handler3
__dllonexit
_onexit
??1type_info@@UAE@XZ
_initterm
_adjust_fdiv
memmove
realloc
free
_purecall
__CxxFrameHandler
??2@YAPAXI@Z
??3@YAXPAX@Z
_itoa
_strlwr
_CxxThrowException
_wcsnicmp
WSACleanup
gethostbyname
gethostname
WSAStartup
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Rundll32
Rundll32_
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ