DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
3ac954d834b3805c3473d21990dd19e4_JaffaCakes118.dll
Resource
win7-20240708-en
Target
3ac954d834b3805c3473d21990dd19e4_JaffaCakes118
Size
668KB
MD5
3ac954d834b3805c3473d21990dd19e4
SHA1
6c1ce395e338404fcff0e7e333b0ffe203e7b2bc
SHA256
1bc62a9b28ec3eb6b8cbc5b3ad5313aad5d563b20d912ca49899af99f5fd5ce7
SHA512
d95f2774a855a4dbaf4503a6e9de52214c744d596bcf10698e42dd379c7456834982272d4b28881eb0b39bd31da70758704f91db3a853202e35009b525194fc5
SSDEEP
12288:wDnxgfYlchDLo1k3fDmMzzz3IenfXmm6mqV0FUVCQoexRTqMRyVZX7SAc2AVPXe:SenfXmm6mqV0FU1WbVZX7SAJm
Checks for missing Authenticode signature.
resource |
---|
3ac954d834b3805c3473d21990dd19e4_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
CreatePropertySheetPageA
PropertySheetA
DestroyPropertySheetPage
ImageList_Create
ImageList_ReplaceIcon
ImageList_DrawEx
ImageList_LoadImageA
ImageList_Destroy
ImageList_Duplicate
PlaySoundA
DeleteUrlCacheEntry
GetUrlCacheEntryInfoW
GetUrlCacheEntryInfoA
FlushInstructionCache
InterlockedIncrement
InterlockedDecrement
GetShortPathNameA
GetModuleHandleA
SizeofResource
LoadResource
FindResourceA
LoadLibraryExA
lstrcmpiA
lstrcpynA
IsDBCSLeadByte
HeapDestroy
GlobalUnlock
GlobalLock
MulDiv
CreateThread
FreeResource
GlobalFree
GlobalHandle
LockResource
GlobalAlloc
HeapFree
HeapAlloc
GetProcessHeap
GetPrivateProfileStringA
CreateEventA
GetSystemInfo
InterlockedExchange
CompareStringA
GetVersionExA
FlushFileBuffers
SetStdHandle
IsBadCodePtr
IsBadReadPtr
GetUserDefaultLCID
EnumSystemLocalesA
GetLocaleInfoA
IsValidCodePage
IsValidLocale
SetFilePointer
lstrcatA
GetStringTypeW
GetStringTypeA
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
LCMapStringW
GetTickCount
IsBadWritePtr
HeapCreate
GetEnvironmentVariableA
SetUnhandledExceptionFilter
HeapSize
TerminateProcess
GetOEMCP
GetACP
GetCPInfo
ExitProcess
TlsGetValue
SetLastError
TlsFree
TlsAlloc
TlsSetValue
GetVersion
GetCommandLineA
GetSystemTime
GetTimeZoneInformation
HeapReAlloc
RaiseException
RtlUnwind
LocalFree
VirtualQuery
VirtualFree
VirtualAlloc
VirtualProtect
lstrlenW
GetCurrentThreadId
CreateFileMappingA
OpenFileMappingA
MapViewOfFile
UnmapViewOfFile
GetCurrentProcessId
LoadLibraryA
ReadProcessMemory
GetProcAddress
FreeLibrary
GetCurrentProcess
VirtualProtectEx
WriteProcessMemory
CreateFileW
CreateFileA
GetFileSize
CloseHandle
GetLastError
CreateDirectoryA
GetFileAttributesA
FindFirstFileA
FindClose
FileTimeToLocalFileTime
FileTimeToDosDateTime
GetTempPathA
GetLongPathNameA
GetModuleFileNameA
lstrcmpA
DeleteFileA
MultiByteToWideChar
WideCharToMultiByte
lstrcpyA
lstrlenA
SystemTimeToFileTime
CompareFileTime
GetLocalTime
GetLocaleInfoW
CompareStringW
SetEnvironmentVariableA
Sleep
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
WriteFile
LCMapStringA
ReadFile
PostMessageA
GetDlgItemInt
SetDlgItemInt
MessageBeep
InvalidateRgn
InvalidateRect
CreateAcceleratorTableA
RedrawWindow
BeginPaint
FillRect
IsChild
RegisterWindowMessageA
DialogBoxIndirectParamA
SystemParametersInfoA
MapWindowPoints
GetMenu
AdjustWindowRectEx
SetForegroundWindow
BringWindowToTop
LoadImageA
ReleaseCapture
SetCapture
GetCursor
SetCursor
KillTimer
IsWindowVisible
GetWindowTextLengthA
TranslateMessage
LoadStringA
GetSystemMetrics
EqualRect
IntersectRect
DestroyWindow
CreatePopupMenu
ClientToScreen
IsWindow
UnhookWindowsHookEx
CharLowerA
DestroyMenu
TrackPopupMenu
SetMenuItemInfoA
GetSubMenu
LoadMenuA
CallWindowProcW
GetParent
GetWindowTextA
DrawEdge
LoadIconA
EndDialog
GetCursorPos
PtInRect
GetDlgItemTextA
SetFocus
SetDlgItemTextA
GetDlgItem
EnableWindow
GetActiveWindow
CopyRect
DrawTextA
GetFocus
GetKeyState
GetAsyncKeyState
DispatchMessageA
PeekMessageA
MessageBoxA
GetClassNameA
GetWindow
FindWindowExA
DefWindowProcA
SetWindowPos
CreateWindowExA
ShowWindow
SendMessageA
EndPaint
GetDesktopWindow
RegisterClassA
LoadCursorA
LoadBitmapA
GetDC
ReleaseDC
SetTimer
GetWindowRect
ScreenToClient
SetWindowTextA
CharNextA
GetClassInfoExA
wsprintfA
RegisterClassExA
GetClientRect
CharUpperA
GetWindowLongA
SetWindowLongA
CallWindowProcA
GetSysColor
LineTo
GetStockObject
GetDeviceCaps
CreateFontIndirectA
DeleteObject
CreateBrushIndirect
MoveToEx
CreateSolidBrush
SelectObject
CreatePen
SetBkMode
Rectangle
DeleteDC
BitBlt
CreateCompatibleDC
TextOutA
SetBkColor
CreateCompatibleBitmap
CreateBitmap
GetObjectA
GetDIBits
GetTextExtentPoint32A
GetSaveFileNameA
RegCloseKey
GetUserNameA
RegSetKeySecurity
RegEnumKeyA
AllocateAndInitializeSid
InitializeAcl
AddAce
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
FreeSid
RegFlushKey
RegOpenKeyExA
RegCreateKeyExA
RegDeleteKeyA
RegEnumKeyExA
RegDeleteValueA
RegQueryInfoKeyA
RegQueryValueExA
RegQueryValueExW
RegSetValueExA
RegSetValueExW
RegEnumValueA
CopySid
GetLengthSid
GetTokenInformation
OpenProcessToken
GetSidSubAuthority
GetSidSubAuthorityCount
GetSidIdentifierAuthority
RegGetKeySecurity
ShellExecuteA
CLSIDFromProgID
CoTaskMemFree
OleLockRunning
StringFromCLSID
CLSIDFromString
OleUninitialize
OleInitialize
CreateStreamOnHGlobal
RegisterDragDrop
ReleaseStgMedium
StringFromIID
CoGetMalloc
CoInitialize
CoCreateInstance
CoUninitialize
CoTaskMemRealloc
CoTaskMemAlloc
SysFreeString
SysAllocString
SysStringLen
SysAllocStringLen
LoadRegTypeLi
VariantClear
DispCallFunc
VarUI4FromStr
RegisterTypeLi
LoadTypeLi
VariantInit
OleCreateFontIndirect
VariantChangeType
GdipFree
GdiplusStartup
GdipDisposeImage
GdipImageGetFrameDimensionsCount
GdipGetImageHeight
GdipGetImageWidth
GdipCloneImage
GdipAlloc
GdipLoadImageFromFile
GdipImageGetFrameDimensionsList
GdipImageGetFrameCount
GdiplusShutdown
SHDeleteKeyA
StrToIntW
IsValidURL
URLDownloadToFileA
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ