DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
2d14561a958de99a2ec202b8713ba3f0_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2d14561a958de99a2ec202b8713ba3f0_JaffaCakes118.dll
Resource
win10v2004-20240704-en
Target
2d14561a958de99a2ec202b8713ba3f0_JaffaCakes118
Size
248KB
MD5
2d14561a958de99a2ec202b8713ba3f0
SHA1
8c2a30e5839b741e980c3dc1e58f8797266936f0
SHA256
493859e049a43ce72e8bf273c863fce0d54e71fd61dc0d4d9a1ba672d0b12d11
SHA512
82ff27ffb88180715073eb0d080d9585e2aa38e763c84c0f5e463c955ca4c0ad981c6310d0f8dda7c3f36a5cb6844a5fde30983dd862491bd86a19e97398d580
SSDEEP
6144:hhp4CW6AL00rKFo+KOxWe02XeayT+2s4G67+jmddQ76L7KrIIYvYBjN9O4bzwaGb:hzLpxa1IHQifBtYz
Checks for missing Authenticode signature.
resource |
---|
2d14561a958de99a2ec202b8713ba3f0_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
InterlockedIncrement
EnterCriticalSection
InterlockedDecrement
MultiByteToWideChar
GetModuleFileNameA
GetLastError
WideCharToMultiByte
lstrlenW
SizeofResource
LoadResource
FindResourceA
LoadLibraryExA
lstrcmpiA
lstrcpynA
IsDBCSLeadByte
GetModuleHandleA
lstrcatA
lstrcmpiW
GetSystemTime
ExitProcess
lstrcatW
lstrcpyW
GetVolumeInformationA
CreateProcessA
CloseHandle
TerminateThread
WaitForSingleObject
CreateThread
SetFileTime
WriteFile
GetFileTime
CreateFileA
Process32Next
Module32First
GetEnvironmentStringsW
LeaveCriticalSection
GetEnvironmentStrings
FlushFileBuffers
SetStdHandle
VirtualQuery
GetSystemInfo
VirtualProtect
LCMapStringW
LCMapStringA
SetFilePointer
GetStringTypeW
DeleteCriticalSection
InitializeCriticalSection
GetThreadLocale
DisableThreadLibraryCalls
GetLocaleInfoA
GetACP
GetVersionExA
InterlockedExchange
Sleep
LoadLibraryA
GetProcAddress
FreeLibrary
lstrlenA
GetStringTypeA
FreeEnvironmentStringsA
GetCPInfo
GetOEMCP
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
SetUnhandledExceptionFilter
IsBadWritePtr
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
TlsAlloc
TlsGetValue
SetLastError
TlsFree
IsBadCodePtr
lstrcpyA
FreeEnvironmentStringsW
LocalFree
RtlUnwind
HeapFree
RaiseException
HeapReAlloc
HeapAlloc
GetSystemTimeAsFileTime
GetCurrentThreadId
TlsSetValue
GetCommandLineA
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
TerminateProcess
GetCurrentProcess
HeapSize
IsBadReadPtr
SetTimer
LoadStringA
GetDoubleClickTime
CharNextA
wsprintfA
CreateMenu
KillTimer
wsprintfW
GetSystemMetrics
GetActiveWindow
CallMsgFilterA
RegCloseKey
RegSetValueExA
RegOpenKeyA
RegQueryInfoKeyA
RegEnumKeyExA
RegCreateKeyExA
RegDeleteValueA
RegCreateKeyA
RegEnumKeyA
RegOpenKeyExA
RegDeleteKeyA
RegQueryValueExA
SHGetSpecialFolderPathA
ShellExecuteA
CoTaskMemAlloc
CoTaskMemRealloc
StringFromCLSID
StringFromGUID2
CoTaskMemFree
CoCreateInstance
SafeArrayAccessData
SafeArrayGetLBound
SafeArrayGetUBound
SafeArrayUnaccessData
SysStringLen
LoadRegTypeLi
UnRegisterTypeLi
LoadTypeLi
SysAllocString
RegisterTypeLi
SysFreeString
VarUI4FromStr
VariantInit
DispCallFunc
VariantClear
PathFindExtensionA
InitCommonControlsEx
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ