DllCanUnloadNow
DllGetClassObject
DllPreTranslateMessage
DllTerm
Static task
static1
Behavioral task
behavioral1
Sample
394ed145153a238bf7252e2405c4444a_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
394ed145153a238bf7252e2405c4444a_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
394ed145153a238bf7252e2405c4444a_JaffaCakes118
Size
89KB
MD5
394ed145153a238bf7252e2405c4444a
SHA1
938ff819b8a28f34c5738eda77531cc4f436dcb0
SHA256
8eb5a7a9958825b1258a0f33c8c9ce0f138878aa2c43a5b26c7676e4ce06716d
SHA512
6f053d571cd89c91e1ac4e7df83a8f5bd7687e27dfef92e875449826190854a241254080bc2c15e2383be24f20e79ba3676c85cb0d0fe39e80a653dfa39ee9c8
SSDEEP
1536:YyoILNsMJK01sWSYHDc21H167hE6qkBkJMdPLXe2DGfnwIn2+O:YyohiF1sWrFX6qkBXdD9Inb
Checks for missing Authenticode signature.
resource |
---|
394ed145153a238bf7252e2405c4444a_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
realloc
strtol
isalnum
strcmp
strtod
strrchr
memmove
_setjmp3
longjmp
memcpy
strcpy
atoi
_ftol
strchr
_strdup
_adjust_fdiv
malloc
_initterm
time
srand
strtoul
rand
isdigit
sprintf
free
strlen
strncmp
_memicmp
memset
wcsrchr
_except_handler3
memcmp
_snprintf
calloc
listen
gethostbyname
WSARecv
WSASend
inet_addr
recv
send
socket
WSAAsyncSelect
connect
htonl
htons
shutdown
bind
WSAIoctl
WSAGetLastError
closesocket
WSASocketA
setsockopt
WSAStartup
SetTimer
SetWindowLongA
KillTimer
SendMessageA
GetProcessWindowStation
GetUserObjectInformationA
CloseWindowStation
SetWinEventHook
RegisterClassExA
CreateWindowExA
GetMessageA
TranslateMessage
DispatchMessageA
UnhookWinEvent
GetClassNameA
GetWindowThreadProcessId
GetWindowLongA
DefWindowProcA
RegCloseKey
RegOpenKeyExA
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
RegQueryValueExA
CoInitializeSecurity
CoCreateInstance
CoInitialize
CoUninitialize
FindFirstFileW
FindNextFileW
lstrcpyW
FindClose
MultiByteToWideChar
Sleep
CreateFileW
GetFileSize
ReadFile
DeleteFileW
DeleteCriticalSection
InitializeCriticalSection
lstrlenA
lstrcatW
LocalFree
CreateFileMappingA
MapViewOfFile
OpenMutexA
CloseHandle
lstrcpyA
GetCurrentProcess
WaitForSingleObject
GetProcAddress
UnmapViewOfFile
GetUserDefaultLCID
GetSystemDefaultLCID
lstrcmpiA
LoadLibraryA
GetFileAttributesW
ExpandEnvironmentStringsW
CreateThread
GetLastError
LocalAlloc
GetModuleHandleA
CreateFileA
GetModuleFileNameA
TlsGetValue
TlsSetValue
GetVolumeInformationA
lstrcmpA
InterlockedIncrement
lstrcatA
IsBadCodePtr
PostQueuedCompletionStatus
GetQueuedCompletionStatus
EnterCriticalSection
LeaveCriticalSection
GetTickCount
InterlockedDecrement
CreateIoCompletionPort
DisableThreadLibraryCalls
CreateMutexA
VirtualFree
IsBadReadPtr
DllCanUnloadNow
DllGetClassObject
DllPreTranslateMessage
DllTerm
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ