DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
30a84dd8c015db07175312240f93c3c0_JaffaCakes118.dll
Resource
win7-20240708-en
Target
30a84dd8c015db07175312240f93c3c0_JaffaCakes118
Size
342KB
MD5
30a84dd8c015db07175312240f93c3c0
SHA1
77c3b6ca9dd054beb4b72c9fd6ced20da0281aa2
SHA256
dcf66a971d836004324cb9fc9cfb30d0d4a61791b6fad22ef92b052bce825b67
SHA512
f58a2a0a9b91f4fa0005919e7fffa99127ff2cd5b901fa23c4d461987083a6799cc8511cbe943fa28d183783750350445a9696a78855d788d74012b40c768fea
SSDEEP
6144:XR988b2K/aLwF0cxe3fqawpbb1IvAyn7FuZTBnzwvZkxs:hhp/aEqce3Nwpbb12huZT1zwKm
Checks for missing Authenticode signature.
resource |
---|
30a84dd8c015db07175312240f93c3c0_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
StrCmpIW
UrlEscapeW
UrlGetPartW
PathMatchSpecW
StrStrIW
UrlUnescapeW
SetEndOfFile
CreateFileA
GetModuleHandleA
GetTimeZoneInformation
SetStdHandle
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
GetModuleFileNameA
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
HeapReAlloc
VirtualAlloc
VirtualFree
HeapDestroy
HeapCreate
InitializeCriticalSectionAndSpinCount
GetStringTypeW
GetStringTypeA
GetLocaleInfoA
ExitProcess
HeapSize
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetCurrentDirectoryA
SetFilePointer
GetDateFormatA
GetTimeFormatA
FlushFileBuffers
GetConsoleMode
GetConsoleCP
ReadFile
IsValidCodePage
GetOEMCP
GetProcessHeap
GetCurrentProcessId
QueryPerformanceCounter
GetLastError
GetFullPathNameW
GetTempFileNameW
GetFileSize
MapViewOfFile
UnmapViewOfFile
VirtualQuery
CreateFileW
LocalAlloc
CreateFileMappingW
CloseHandle
LocalFree
WaitForSingleObject
TerminateThread
Sleep
SetThreadPriority
GetExitCodeThread
FreeLibrary
WriteFile
GetProcAddress
LoadLibraryA
DeleteFileW
WideCharToMultiByte
lstrlenW
SetLastError
GetTempPathW
GetSystemInfo
GetWindowsDirectoryW
GetVolumeInformationW
CreateMutexW
CreateProcessW
GetTickCount
ReleaseMutex
GetSystemTime
MoveFileExW
GetModuleHandleW
GetDriveTypeA
CompareStringA
CompareStringW
GetModuleFileNameW
MultiByteToWideChar
lstrcmpW
DeleteCriticalSection
InitializeCriticalSection
HeapAlloc
GetCPInfo
GetEnvironmentStringsW
LCMapStringW
LCMapStringA
LeaveCriticalSection
EnterCriticalSection
InterlockedDecrement
InterlockedIncrement
FreeEnvironmentStringsA
GetEnvironmentStrings
GetACP
SetEnvironmentVariableA
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapFree
GetCurrentThreadId
GetCommandLineA
GetSystemTimeAsFileTime
ExitThread
CreateThread
FindClose
FileTimeToSystemTime
FileTimeToLocalFileTime
GetDriveTypeW
FindFirstFileW
RaiseException
RtlUnwind
FreeEnvironmentStringsW
wsprintfW
EnumChildWindows
RealGetWindowClassW
GetWindowTextW
SendMessageW
SetWindowLongW
CallWindowProcW
GetWindowLongW
SetWindowTextW
SetWindowPos
CoCreateInstance
CoUninitialize
CoTaskMemFree
CoInitialize
VariantCopy
SysAllocStringLen
SysFreeString
SysAllocString
SysStringByteLen
SysAllocStringByteLen
VariantInit
VariantClear
SafeArrayCreateVector
SafeArrayPutElement
SafeArrayDestroy
VariantChangeType
inet_addr
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
UuidToStringW
RpcStringFreeW
UrlMkGetSessionOption
InternetSetOptionW
InternetOpenW
InternetQueryOptionW
InternetCrackUrlW
InternetReadFile
HttpSendRequestW
InternetConnectW
HttpQueryInfoW
InternetCloseHandle
HttpOpenRequestW
UnMapAndLoad
MapAndLoad
CryptGetHashParam
CryptDestroyHash
CryptDecrypt
CryptDestroyKey
CryptCreateHash
CryptEncrypt
CryptDeriveKey
RegSetValueExW
RegCloseKey
RegDeleteValueW
RegDeleteKeyW
RegQueryValueExW
RegCreateKeyW
CryptGenRandom
CryptReleaseContext
CryptAcquireContextW
CryptHashData
SHCreateDirectoryExW
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ