DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
gettextadvert
Static task
static1
Behavioral task
behavioral1
Sample
3ad51d0c59e3a7614fef2181e126118a_JaffaCakes118.dll
Resource
win7-20240704-en
Target
3ad51d0c59e3a7614fef2181e126118a_JaffaCakes118
Size
477KB
MD5
3ad51d0c59e3a7614fef2181e126118a
SHA1
7355d7a2f02167d3ab59301f56015982ffcb42b7
SHA256
320ffe17abde202e98bb222082195a68c88165b0938ecbff09cae703acc77fc8
SHA512
deca197903fcbb16955af1e274a45e01702090e9c17732f94a1390ec9ab55886a531891dfea7e8d254c738876dca60e3ac2f2b72c30c67d18a2e89673f802362
SSDEEP
12288:q5kacu0i9lmUWXq9Tt3l2Nutg/cnmQPVKFgKFbvivN1Fb5ZS/HWwNxaj50qr9SeZ:MRcu0i9UUNKD
Checks for missing Authenticode signature.
resource |
---|
3ad51d0c59e3a7614fef2181e126118a_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
lstrlenW
MultiByteToWideChar
lstrlenA
CloseHandle
WriteFile
CreateFileW
FreeLibrary
LoadLibraryExW
RaiseException
lstrcmpiW
GetModuleFileNameW
InterlockedIncrement
InterlockedDecrement
WideCharToMultiByte
SetThreadLocale
GetThreadLocale
CreateThread
GetVersionExW
DeleteFileW
GetProcAddress
LoadLibraryW
FlushFileBuffers
GetTickCount
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
FindResourceW
LoadResource
LockResource
SizeofResource
GetModuleHandleW
GetLastError
CreateFileA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
GetConsoleMode
GetConsoleCP
SetFilePointer
GetCurrentProcessId
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
SetHandleCount
InterlockedExchange
GetOEMCP
GetACP
GetCPInfo
GetModuleFileNameA
GetStdHandle
ExitProcess
HeapSize
Sleep
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
LoadLibraryA
HeapFree
HeapAlloc
HeapReAlloc
RtlUnwind
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCommandLineA
GetVersionExA
GetProcessHeap
GetModuleHandleA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
CharLowerA
CharNextW
wsprintfW
UnregisterClassA
IsTextUnicode
RegEnumKeyExW
RegQueryInfoKeyW
RegSetValueExW
RegOpenKeyExW
RegCreateKeyExW
RegCloseKey
RegDeleteValueW
RegDeleteKeyW
RegQueryValueExW
SHGetFolderPathW
CoTaskMemFree
CoGetClassObject
StringFromGUID2
CoTaskMemAlloc
CoTaskMemRealloc
CoCreateInstance
VarBstrCat
SysAllocStringLen
SysFreeString
SysAllocString
SysAllocStringByteLen
SysStringByteLen
SysStringLen
LoadTypeLi
UnRegisterTypeLi
RegisterTypeLi
VarUI4FromStr
VarBstrCmp
LoadRegTypeLi
NdrStubForwardingFunction
NdrOleFree
NdrOleAllocate
IUnknown_Release_Proxy
IUnknown_AddRef_Proxy
IUnknown_QueryInterface_Proxy
NdrDllGetClassObject
NdrDllCanUnloadNow
NdrCStdStubBuffer2_Release
NdrDllRegisterProxy
NdrDllUnregisterProxy
InternetSetCookieW
InternetCrackUrlW
InternetGetCookieW
CoInternetGetSession
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
gettextadvert
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ