DllCanUnloadNow
DllGetClassObject
DllMain
DllRegisterServer
DllUnregisterServer
SophosDllGetClassObject
Static task
static1
Behavioral task
behavioral1
Sample
33b7c8d4aa0089b54690b7a566783cbc_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
33b7c8d4aa0089b54690b7a566783cbc_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
33b7c8d4aa0089b54690b7a566783cbc_JaffaCakes118
Size
68KB
MD5
33b7c8d4aa0089b54690b7a566783cbc
SHA1
f1688ae7df6d1ac499a3f6db701c50a7dc335033
SHA256
7b3c9208db334d85624293cb7eb36116633a29f739670947e39e5fe5843c702e
SHA512
a1947d82dde1d98028fdf31439a28f7f6d466d0f976794d735407aed64adb9cbf80c1d6e439688efb0a200d641c78751f69f0cbbdb1c6f23163f61304fb28051
SSDEEP
768:xHC6OSDkDLsPb9+hZXmhB1G+4cR95rnOACR1zwn75PR1tVsTO7a:tC6XDXb9VhB1G+LTrnutwbpUO7a
Checks for missing Authenticode signature.
resource |
---|
33b7c8d4aa0089b54690b7a566783cbc_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
ord4035
ord310
ord2256
ord5189
ord1793
ord1881
ord6067
ord2657
ord1774
ord1892
ord2164
ord6236
ord4190
ord784
ord304
ord297
ord1489
ord299
ord2933
ord3132
ord3133
ord6090
ord4541
ord3683
ord1091
ord757
ord314
ord3830
ord1123
ord2248
ord907
ord4038
ord4014
ord6278
ord3801
ord4326
ord2063
ord2018
ord5583
ord3806
ord1010
ord5102
ord6219
ord5382
ord3832
ord1920
ord2931
ord5224
ord5226
ord3948
ord4568
ord5230
ord5213
ord5566
ord2838
ord4481
ord4261
ord3333
ord566
ord718
ord266
ord5211
ord3920
ord265
ord4109
ord781
ord3997
ord5529
ord5235
ord5233
ord2390
ord2400
ord2398
ord2396
ord2392
ord2415
ord2403
ord1201
ord1175
ord1177
ord1209
ord1092
ord1167
ord581
ord371
ord1098
ord1208
ord1206
ord1037
ord315
ord765
ord3667
ord764
ord762
ord1084
ord2372
ord5071
ord5072
ord5070
ord4797
ord4617
ord4867
ord4844
ord5182
ord4213
ord4736
ord4890
ord2020
ord1671
ord1670
ord1551
ord5912
ord1620
ord1617
ord3946
ord1401
ord4244
ord5152
ord2322
ord3761
ord4104
ord578
ord3552
ord4551
ord4580
ord5895
ord516
ord3293
ord4262
ord4486
ord3949
ord2644
ord3709
ord3719
ord3718
ord2974
ord2533
ord2646
ord2540
ord2862
ord2714
ord4307
ord2835
ord2731
ord2537
ord5200
ord1599
ord1908
ord1655
ord1656
ord1964
ord5175
ord1362
ord4967
ord3345
ord6277
ord3802
ord6279
ord1522
ord2172
ord2178
ord2405
ord2387
ord2385
ord2408
ord2413
ord2394
ord2410
ord934
ord930
ord932
ord928
ord923
ord5960
ord1600
ord4282
ord4720
ord3403
ord4185
ord6275
ord5073
ord1120
??0exception@@QAE@XZ
memmove
memcpy
wcstombs
strlen
strcat
strcpy
_mbsstr
_mbslwr
wcscmp
atoi
_itoa
_vsnprintf
_vscprintf
memset
??1type_info@@UAE@XZ
__dllonexit
_onexit
_initterm
_adjust_fdiv
__CppXcptFilter
__security_error_handler
?terminate@@YAXXZ
??1exception@@UAE@XZ
sprintf
_CxxThrowException
??0exception@@QAE@ABV0@@Z
__CxxFrameHandler
_purecall
_except_handler3
free
malloc
GetProcessHeap
lstrcmpA
HeapSize
HeapDestroy
HeapAlloc
HeapFree
HeapReAlloc
GetSystemTimeAsFileTime
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
ExitProcess
LocalAlloc
LocalFree
GetCurrentProcessId
InterlockedDecrement
DeleteCriticalSection
InitializeCriticalSection
GetModuleHandleA
GetModuleFileNameA
GetProcAddress
GetUserDefaultLangID
FreeLibrary
LoadLibraryA
CreateEventA
SetEvent
CloseHandle
lstrlenA
GetLastError
WideCharToMultiByte
MultiByteToWideChar
GetVersionExA
EnableWindow
SendMessageA
GetParent
PostMessageA
RegQueryValueExA
RegOpenKeyExA
RegDeleteKeyA
RegCloseKey
RegCreateKeyExA
RegSetValueExA
RegEnumKeyExA
?find@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDII@Z
?replace@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@IIPBD@Z
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBD@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBDI@Z
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@ABV01@@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?c_str@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEPBDXZ
CoCreateInstance
CoGetClassObject
CoTaskMemFree
StringFromCLSID
CoRevokeClassObject
SysFreeString
SysAllocString
VariantClear
DllCanUnloadNow
DllGetClassObject
DllMain
DllRegisterServer
DllUnregisterServer
SophosDllGetClassObject
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ