?Authenticate_b@@YA_NPAE@Z
?InitAuthentication_v@@YAXPAE@Z
?IsAuthenticated_b@@YA_NXZ
?IsUnlocked_b@@YA_NXZ
?Unlock_b@@YA_NXZ
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
371c397b94fbfcf9b52b304e878e3134_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
371c397b94fbfcf9b52b304e878e3134_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
371c397b94fbfcf9b52b304e878e3134_JaffaCakes118
Size
344KB
MD5
371c397b94fbfcf9b52b304e878e3134
SHA1
99b4f0763794e7b4124c613aab869173fd244c64
SHA256
cb76cc471e68eab72ad61e44d8033b93f541ce7a69fa7a3e1e7dafaa68195b35
SHA512
2748f435bbebf348d85d23c9b07b2041d4b3e688c44c4be36a067057624b36d9ad66bbfb3d1fd8bdf95f993680fd66c2f0d660dc26cd511251021cb1d4596773
SSDEEP
6144:jEVn/i9l5AS+Y9jf98ZKab9MP7ntsmNI6I8BJDgcy/LWVo:4Va9l5ASJjV8LY7ntsmBBZgc
Checks for missing Authenticode signature.
resource |
---|
371c397b94fbfcf9b52b304e878e3134_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Sleep
MultiByteToWideChar
GetSystemInfo
GetFileSize
LocalFree
FormatMessageA
IsBadWritePtr
IsBadReadPtr
HeapFree
GetProcessHeap
HeapAlloc
HeapDestroy
DeleteCriticalSection
DisableThreadLibraryCalls
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
lstrcpyA
lstrlenA
GetShortPathNameA
GetModuleFileNameA
FreeLibrary
SizeofResource
LoadResource
FindResourceA
LoadLibraryExA
lstrcmpiA
lstrcpynA
IsDBCSLeadByte
GetProcAddress
LoadLibraryA
lstrcatA
SetEndOfFile
WriteFile
ReadFile
GetDiskFreeSpaceA
lstrlenW
WideCharToMultiByte
CreateFileA
SetFilePointer
CloseHandle
InterlockedDecrement
InterlockedIncrement
GetEnvironmentVariableA
GetLastError
GetVersionExA
RaiseException
LCMapStringW
GetOEMCP
GetVolumeInformationA
GetTickCount
RtlUnwind
ResumeThread
CreateThread
TlsSetValue
ExitThread
HeapReAlloc
GetCommandLineA
GetVersion
GetCurrentThreadId
TlsAlloc
TlsFree
SetLastError
TlsGetValue
GetModuleHandleA
ExitProcess
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
FreeEnvironmentStringsW
LCMapStringA
HeapCreate
VirtualFree
VirtualAlloc
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
SetStdHandle
GetEnvironmentStrings
GetEnvironmentStringsW
HeapSize
SetUnhandledExceptionFilter
IsBadCodePtr
FlushFileBuffers
GetStringTypeA
GetStringTypeW
GetCPInfo
GetACP
wsprintfA
CharNextA
MessageBoxA
RegEnumValueA
RegQueryInfoKeyA
RegSetValueExA
RegCreateKeyExA
RegEnumKeyExA
RegDeleteKeyA
RegDeleteValueA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
CoTaskMemAlloc
CoTaskMemFree
CoTaskMemRealloc
CoCreateInstance
RegisterTypeLi
LoadRegTypeLi
SysStringLen
SysFreeString
LoadTypeLi
VarUI4FromStr
SysAllocString
?Authenticate_b@@YA_NPAE@Z
?InitAuthentication_v@@YAXPAE@Z
?IsAuthenticated_b@@YA_NXZ
?IsUnlocked_b@@YA_NXZ
?Unlock_b@@YA_NXZ
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE