DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
33e67841a8a4abfcba921d817ca93fb5_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
33e67841a8a4abfcba921d817ca93fb5_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
33e67841a8a4abfcba921d817ca93fb5_JaffaCakes118
Size
156KB
MD5
33e67841a8a4abfcba921d817ca93fb5
SHA1
4fb109f94d59d9f27c8d77398667ac21a2bbdd3d
SHA256
f85360809fd4bb77583d31002251e042646149805e9dab40ea9a317f6aa49d7b
SHA512
6ac265fc41d21dc2b827e3601e03114817ec0e56ce34636e611cec47426143facfc44933c3eb2833e22a63ee55fdc990b1f207c7a75e1338bf0465a12fc868e1
SSDEEP
3072:WGuxXScnouwO7kWaZIVLkek6HIXdAZzXcWdzxx:WGSXPbbhLtHcdAZzXXdz
Checks for missing Authenticode signature.
resource |
---|
33e67841a8a4abfcba921d817ca93fb5_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
lstrcpynA
lstrlenA
GetModuleFileNameA
FlushInstructionCache
GetCurrentProcess
HeapFree
GetProcessHeap
HeapAlloc
FreeResource
MultiByteToWideChar
WideCharToMultiByte
LoadLibraryW
GetLastError
SetLastError
GetModuleFileNameW
OutputDebugStringA
LoadLibraryA
GetCurrentThreadId
lstrcpyA
InterlockedDecrement
GetLocalTime
CloseHandle
ReadFile
CreateFileA
DeleteFileA
LocalFree
OpenMutexA
OpenFileMappingA
OpenEventA
ResetEvent
SetEvent
UnmapViewOfFile
ReleaseMutex
MapViewOfFile
WaitForSingleObject
CreateEventA
WaitForMultipleObjects
lstrcmpiA
lstrlenW
FindResourceExA
InterlockedIncrement
LoadLibraryExA
DisableThreadLibraryCalls
lstrcatA
IsDBCSLeadByte
CreateThread
FindResourceW
FindResourceExW
SetFilePointer
SetFileAttributesA
GetFileAttributesA
GetCurrentProcessId
FlushFileBuffers
WriteFile
GetSystemTime
SetErrorMode
SetUnhandledExceptionFilter
Sleep
FindResourceA
LoadResource
GetSystemTimeAsFileTime
GetTickCount
QueryPerformanceCounter
DebugBreak
ExitProcess
HeapSize
HeapReAlloc
HeapDestroy
LocalAlloc
GetPrivateProfileStringA
LockResource
SizeofResource
DeleteCriticalSection
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
RaiseException
GetVersionExA
GetModuleHandleA
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
FreeLibrary
GetVersion
GetFileAttributesW
GetProcAddress
GetModuleHandleW
GetCapture
ReleaseDC
GetDC
GetSysColor
FillRect
SetCursor
MessageBoxA
LoadImageW
LoadImageA
LoadCursorW
LoadIconW
LoadIconA
LoadBitmapW
LoadBitmapA
LoadStringW
LoadStringA
GetDesktopWindow
GetDlgItem
GetFocus
CharNextA
IsWindowEnabled
EndPaint
BeginPaint
ClientToScreen
GetWindowTextA
GetWindow
ReleaseCapture
GetDlgCtrlID
SetCapture
KillTimer
SystemParametersInfoA
CallWindowProcA
SetWindowRgn
CreateWindowExA
GetClassInfoExA
RegisterClassExA
UnregisterClassA
PtInRect
GetParent
LoadCursorA
wsprintfA
IsWindow
AdjustWindowRectEx
SetTimer
RedrawWindow
ShowWindow
InvalidateRect
UpdateWindow
GetClientRect
GetWindowRect
SetWindowPos
MoveWindow
GetMenu
SetWindowTextA
PostMessageA
GetWindowLongA
SetWindowLongA
DrawTextA
DestroyWindow
SendMessageA
DefWindowProcA
CreateCompatibleDC
CreateCompatibleBitmap
DeleteObject
CreateSolidBrush
SetTextColor
GetTextMetricsA
CreateRoundRectRgn
SelectObject
SetBkMode
GetStockObject
StretchBlt
SetStretchBltMode
CreateFontIndirectA
CreateDIBitmap
StretchDIBits
GetObjectA
DeleteDC
ShellExecuteA
CoInitialize
OleRun
CoUninitialize
CoTaskMemAlloc
CoTaskMemFree
CoTaskMemRealloc
CoCreateInstance
StringFromGUID2
SysFreeString
SysAllocStringLen
VariantInit
VariantClear
SysAllocString
LoadTypeLi
UnRegisterTypeLi
RegisterTypeLi
VarUI4FromStr
LoadRegTypeLi
SysStringLen
VariantCopy
VariantChangeType
SafeArrayGetUBound
SafeArrayGetLBound
SafeArrayLock
SafeArrayUnlock
SafeArrayDestroy
PathAppendA
PathFileExistsA
PathFindExtensionA
??Y?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@D@Z
??Y?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@ABV01@@Z
?_Nomemory@std@@YAXXZ
?rfind@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDI@Z
?erase@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@II@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@PBD@Z
?size@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIXZ
?substr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBE?AV12@II@Z
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@ABV01@@Z
??Y?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@PBD@Z
?c_str@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEPBDXZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??0?$basic_ostringstream@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@H@Z
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV01@K@Z
?str@?$basic_ostringstream@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBE?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@2@XZ
??_D?$basic_ostringstream@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEXXZ
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
wcsncpy
__security_error_handler
__CppXcptFilter
_adjust_fdiv
_initterm
?terminate@@YAXXZ
_onexit
__dllonexit
??1type_info@@UAE@XZ
_callnewh
??0exception@@QAE@ABQBD@Z
?what@exception@@UBEPBDXZ
_vsnprintf
strrchr
_snprintf
wcslen
_mbscmp
free
_CxxThrowException
memset
_except_handler3
_mktime64
memcpy
malloc
??_V@YAXPAX@Z
??3@YAXPAX@Z
_mbsstr
_mbschr
strlen
_vscprintf
vsprintf
__CxxFrameHandler
memmove
_time64
realloc
??8type_info@@QBEHABV0@@Z
atoi
sscanf
??1exception@@UAE@XZ
??0exception@@QAE@ABV0@@Z
??0exception@@QAE@XZ
_endthread
_beginthread
_resetstkoflw
wcscpy
memcmp
_purecall
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ