DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
3804c93324a8a12fd0f5a5af752bba7e_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3804c93324a8a12fd0f5a5af752bba7e_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
3804c93324a8a12fd0f5a5af752bba7e_JaffaCakes118
Size
168KB
MD5
3804c93324a8a12fd0f5a5af752bba7e
SHA1
d3c21afb33337d1b296f813dfac1701ea98631ee
SHA256
fa5daccf3b46dea9c4dfb15842d7846eecacf0e6a90b144d94bfd9e3cdf5335a
SHA512
d3fa4dba817e5c3b9b56fd7d94409d144de0214ff545772af6b39b7571816bc18061cb55a7d2f23cd6d404205b10edf7a8e11df848811f227daa1aa36b58b114
SSDEEP
1536:oBUh6NFaEO6eNQXFXMITfc841fmJlMNnhGjViCLExmuhyK0Z7d69qqQ:IO6eNQXJBXgeJlAjCLExmGyK0r8Q
Checks for missing Authenticode signature.
resource |
---|
3804c93324a8a12fd0f5a5af752bba7e_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
EVENT_SINK_GetIDsOfNames
__vbaStrI2
__vbaNextEachAry
_CIcos
_adj_fptan
__vbaHresultCheck
__vbaVarMove
__vbaVarVargNofree
__vbaFreeVar
ord587
__vbaStrVarMove
__vbaLenBstr
__vbaLateIdCall
__vbaAptOffset
__vbaFreeVarList
_adj_fdiv_m64
EVENT_SINK_Invoke
__vbaFreeObjList
ord516
ord517
_adj_fprem1
ord519
__vbaResume
__vbaStrCat
__vbaLsetFixstr
__vbaInStrVarB
__vbaSetSystemError
__vbaHresultCheckObj
__vbaLenVar
_adj_fdiv_m32
__vbaAryVar
Zombie_GetTypeInfo
__vbaAryDestruct
__vbaStrBool
__vbaExitProc
__vbaBoolStr
__vbaForEachCollObj
ord593
ord594
__vbaObjSet
__vbaStrLike
__vbaOnError
_adj_fdiv_m16i
__vbaObjSetAddref
_adj_fdivr_m16i
ord598
__vbaBoolVar
__vbaFPFix
__vbaBoolVarNull
_CIsin
ord631
__vbaNextEachCollObj
ord632
ord525
__vbaChkstk
ord526
EVENT_SINK_AddRef
__vbaGenerateBoundsError
ord528
__vbaStrCmp
__vbaExitEachColl
__vbaVarTstEq
__vbaVarLikeVar
__vbaI2I4
DllFunctionCall
__vbaVarOr
ord564
__vbaCastObjVar
_adj_fpatan
__vbaFixstrConstruct
__vbaLateIdCallLd
Zombie_GetTypeInfoCount
__vbaRedim
__vbaStrR8
EVENT_SINK_Release
__vbaNew
__vbaUI1I2
_CIsqrt
EVENT_SINK_QueryInterface
__vbaExceptHandler
ord711
ord712
__vbaStrToUnicode
__vbaExitEachAry
_adj_fprem
_adj_fdivr_m64
ord607
ord714
ord608
__vbaFPException
ord717
ord319
__vbaStrVarVal
__vbaUbound
__vbaVarCat
ord537
_CIlog
__vbaErrorOverflow
__vbaInStr
__vbaR8Str
__vbaNew2
_adj_fdiv_m32i
ord572
_adj_fdivr_m32i
ord573
__vbaStrCopy
ord681
__vbaFreeStrList
__vbaVarNot
_adj_fdivr_m32
__vbaR8Var
_adj_fdiv_r
ord685
ord101
ord102
__vbaI4Var
ord103
__vbaVarCmpEq
__vbaForEachAry
ord104
ord105
__vbaAryLock
__vbaVarAdd
__vbaInStrB
ord320
__vbaVarDup
__vbaStrToAnsi
ord321
ord614
__vbaVarCopy
__vbaVarLateMemCallLd
__vbaFpI4
ord616
ord617
_CIatan
__vbaStrMove
__vbaAryCopy
__vbaCastObj
ord619
_allmul
__vbaLateIdSt
_CItan
__vbaAryUnlock
__vbaFPInt
_CIexp
__vbaFreeStr
__vbaFreeObj
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ