DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
InitializeMonitorEx
InitializePrintMonitor
InitializePrintMonitor2
InitializePrintMonitorUI
Static task
static1
Behavioral task
behavioral1
Sample
3f029b4d6c230d8b34bb4cb0d534e77c_JaffaCakes118.dll
Resource
win7-20240705-en
Target
3f029b4d6c230d8b34bb4cb0d534e77c_JaffaCakes118
Size
196KB
MD5
3f029b4d6c230d8b34bb4cb0d534e77c
SHA1
a25967c59c5d59efa938979dfeab5e03ac8b98ba
SHA256
78b77b7609ed08ff77c02e92a395ab8d2daa13acb1d20ce484ce178a988b1971
SHA512
735cafcedaeb5feb50d1f8107f94f346917cfdf9e220c3294b35721b9caba808a0c33bd35c89992ced7a0c055db3db0d16c52c8b0e7adda9480f5d905c19424f
SSDEEP
3072:Hl8/fFIr7vpZQlKanW6RazhAIvhC8uSaWm2Q30RCubHTJXl:KFOvngzRazhALUaWmMdbzj
Checks for missing Authenticode signature.
resource |
---|
3f029b4d6c230d8b34bb4cb0d534e77c_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
WaitForSingleObject
DeleteFileA
GetVersion
OpenProcess
CreateProcessA
GetEnvironmentStrings
GetWindowsDirectoryA
GetExitCodeProcess
GetACP
FreeLibrary
SetStdHandle
SetFilePointer
IsBadCodePtr
OpenFileMappingA
CallNamedPipeA
OutputDebugStringA
CreateFileMappingA
LocalFree
MapViewOfFile
GetFileSize
lstrcmpA
UnmapViewOfFile
FlushFileBuffers
CloseHandle
WriteFile
LoadLibraryA
GetProcAddress
GetTempPathA
GetCurrentThreadId
InterlockedIncrement
CreateFileA
DisableThreadLibraryCalls
lstrlenW
lstrlenA
InterlockedDecrement
IsBadReadPtr
GetEnvironmentStringsW
MultiByteToWideChar
GetVersionExA
GetLastError
WideCharToMultiByte
GetCPInfo
SetLastError
FreeEnvironmentStringsW
LCMapStringW
LCMapStringA
GetStringTypeW
GetStringTypeA
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
SetUnhandledExceptionFilter
HeapSize
GetCurrentProcess
TerminateProcess
ExitProcess
RtlUnwind
HeapFree
HeapAlloc
RaiseException
GetCommandLineA
TlsSetValue
TlsAlloc
TlsFree
TlsGetValue
GetModuleHandleA
GetModuleFileNameA
GetEnvironmentVariableA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
IsBadWritePtr
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetOEMCP
LoadStringA
PostMessageA
IsWindow
RegisterWindowMessageA
OpenProcessToken
RegQueryValueExA
RegOpenKeyExA
RevertToSelf
CreateProcessAsUserA
RegCloseKey
ImpersonateLoggedOnUser
VariantClear
ord16
ord15
ord18
ord21
ord57
OpenPrinterA
ClosePrinter
EnumJobsA
PathFileExistsA
PathFindFileNameA
StrStrIA
PathAddBackslashA
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
InitializeMonitorEx
InitializePrintMonitor
InitializePrintMonitor2
InitializePrintMonitorUI
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ