DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
37842ac902a29e173e6468189e0a6e42_JaffaCakes118.dll
Resource
win7-20240705-en
Target
37842ac902a29e173e6468189e0a6e42_JaffaCakes118
Size
552KB
MD5
37842ac902a29e173e6468189e0a6e42
SHA1
f6c0015750675453a977fd191caf048e7a0577b8
SHA256
9b698521368a262b96d55431c0f46f27ad88ff95c0a549f9d11d8d562c4bb2b5
SHA512
8662661671ae78b16f838d37f2068f81ce3771a54d2af81c38bf0475fb3044b155a3d983fa6be47a51883c51b71018f468a985aa03e6e19cd55638c46fed97e1
SSDEEP
6144:HX5JIFGafGbvHXAQFKjuNwlCAOo0YB8OtQJVlsnHoTqhr3pakB61:Jxaf0vHv+oZkn7l
Checks for missing Authenticode signature.
resource |
---|
37842ac902a29e173e6468189e0a6e42_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
InterlockedDecrement
EnterCriticalSection
LeaveCriticalSection
GetModuleFileNameW
MultiByteToWideChar
SizeofResource
LoadResource
FindResourceW
LoadLibraryExW
GetModuleHandleW
LockResource
SetThreadLocale
GetThreadLocale
InterlockedIncrement
EndUpdateResourceW
UpdateResourceW
BeginUpdateResourceW
CloseHandle
TerminateThread
Sleep
GetExitCodeThread
GetTickCount
SetEnvironmentVariableA
CompareStringW
CompareStringA
GetTimeZoneInformation
lstrcmpiW
DeleteCriticalSection
InitializeCriticalSection
RaiseException
LoadLibraryW
GetProcAddress
lstrlenW
WideCharToMultiByte
GetLastError
lstrlenA
FreeLibrary
GetLocaleInfoW
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
GetDateFormatA
GetTimeFormatA
GetStringTypeW
LCMapStringW
LCMapStringA
LoadLibraryA
InterlockedExchange
SetConsoleCtrlHandler
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetStringTypeA
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
SetHandleCount
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
GetModuleFileNameA
GetStdHandle
WriteFile
ExitProcess
GetCurrentThread
SetLastError
TlsFree
TlsSetValue
HeapFree
HeapAlloc
HeapReAlloc
RtlUnwind
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCurrentThreadId
GetCommandLineA
GetVersionExA
GetProcessHeap
HeapDestroy
HeapCreate
VirtualFree
FatalAppExitA
VirtualAlloc
HeapSize
GetModuleHandleA
TlsGetValue
TlsAlloc
UnregisterClassA
MessageBoxW
PostMessageW
CharNextW
IsTextUnicode
RegEnumKeyExW
RegQueryInfoKeyW
RegSetValueExW
RegOpenKeyExW
RegCreateKeyExW
RegCloseKey
RegDeleteValueW
RegDeleteKeyW
RegQueryValueExW
CoGetClassObject
CoTaskMemAlloc
StringFromCLSID
StringFromGUID2
CoCreateInstance
CoTaskMemRealloc
CoTaskMemFree
RegisterTypeLi
VarBstrCmp
SysFreeString
SysAllocString
SysAllocStringByteLen
SysStringByteLen
VarUI4FromStr
SysStringLen
LoadRegTypeLi
LoadTypeLi
VarBstrCat
VariantClear
UnRegisterTypeLi
SysAllocStringLen
NdrStubForwardingFunction
NdrOleFree
NdrOleAllocate
IUnknown_Release_Proxy
IUnknown_AddRef_Proxy
IUnknown_QueryInterface_Proxy
NdrDllGetClassObject
NdrDllCanUnloadNow
NdrCStdStubBuffer_Release
NdrCStdStubBuffer2_Release
NdrDllRegisterProxy
NdrDllUnregisterProxy
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ