DllInit
DllInstall
Static task
static1
Behavioral task
behavioral1
Sample
3b489ca138175ba816b0b6fa81098216_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
3b489ca138175ba816b0b6fa81098216_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
3b489ca138175ba816b0b6fa81098216_JaffaCakes118
Size
72KB
MD5
3b489ca138175ba816b0b6fa81098216
SHA1
4fae1ec153404b65ac097c793ad5e06aad094c7c
SHA256
0cffdf53bd0fc05f16dcbade93504c260d236e9228522b1bbb04cd1661494741
SHA512
4bdfe07278025fd522f76084b3e4619a41c586889c27f4e4db3c28e92a60e6df76c94b175fd3d9c91972bf52c514054e97d065123c4aca6165dd190267d5259b
SSDEEP
1536:EPdLF6hUOLtIo4KHRJkpqXwOn8KATc0+3LHDcc9vgkVM7KX7Sm:EPlF/0IL+RJZ5dAQ33LHDX9o/7KXW
Checks for missing Authenticode signature.
resource |
---|
3b489ca138175ba816b0b6fa81098216_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
InterlockedExchange
lstrlenA
HeapValidate
lstrcpyW
WaitForSingleObject
HeapFree
UnmapViewOfFile
CreateThread
LoadLibraryA
GetSystemTimeAsFileTime
GetProcessHeap
GetProcAddress
lstrlenW
GetComputerNameA
VirtualQuery
InitializeCriticalSection
GetLastError
CreateMutexA
CreateProcessA
MapViewOfFile
CloseHandle
VirtualProtect
HeapAlloc
LockResource
WriteConsoleInputA
SleepEx
HeapDestroy
CreateConsoleScreenBuffer
TerminateProcess
CreateEventA
SetFileAttributesA
LCMapStringA
DeleteFileW
SetVolumeMountPointW
lstrcmpA
GetStringTypeExA
HeapSize
GetFileInformationByHandle
GetSystemWindowsDirectoryA
GetSystemPowerStatus
LocalHandle
GetCurrentProcessId
CreateDirectoryW
GetLogicalDriveStringsA
GetDriveTypeW
ReadConsoleW
LocalFileTimeToFileTime
SetInformationJobObject
GetFileAttributesA
SetEnvironmentVariableA
GetDefaultCommConfigW
SearchPathW
lstrcmpiW
WaitNamedPipeW
GetSystemTimeAdjustment
FileTimeToSystemTime
MoveFileA
GetLocalTime
ReleaseSemaphore
GetWindowsDirectoryA
WaitForSingleObjectEx
UnregisterWaitEx
IsBadStringPtrA
GlobalFindAtomW
SetHandleInformation
GetLongPathNameW
GetEnvironmentVariableA
CreateMailslotA
GetDateFormatA
TransactNamedPipe
lstrcpynA
lstrcpynW
GetVersionExW
ResumeThread
SetCurrentDirectoryA
GetSystemDefaultUILanguage
SetLocalTime
FindNextFileW
GetProfileSectionA
GetThreadLocale
FindNextChangeNotification
FindResourceA
AssignProcessToJobObject
CompareStringA
HeapCreate
IsBadWritePtr
ProcessIdToSessionId
GetFileAttributesW
GetNumberFormatA
GetExitCodeThread
MoveFileW
GlobalGetAtomNameW
GetLogicalDriveStringsW
GetStringTypeW
GetVolumeInformationA
EnumResourceNamesW
GetVolumeNameForVolumeMountPointW
GetProfileStringA
FillConsoleOutputAttribute
GetWindowsDirectoryW
SetEnvironmentVariableW
CreateTimerQueueTimer
FindFirstVolumeW
FindAtomW
PeekConsoleInputA
GetHandleInformation
SetProcessWorkingSetSize
SwitchToThread
IsBadStringPtrW
FreeConsole
GetConsoleMode
FindClose
WideCharToMultiByte
GetThreadPriority
GetProcessVersion
SetNamedPipeHandleState
GlobalMemoryStatusEx
ReadConsoleA
InterlockedExchangeAdd
GlobalFlags
FindAtomA
GetStartupInfoW
GlobalFindAtomA
WaitForMultipleObjects
GetFileAttributesExW
CallNamedPipeA
DeleteTimerQueueTimer
DisconnectNamedPipe
RegisterWaitForSingleObject
GetModuleHandleW
MapViewOfFileEx
OpenEventW
GetBinaryTypeW
DeviceIoControl
StrStrIW
StrStrIA
SHGetValueW
PathFindFileNameW
PathIsRelativeW
StrCatBuffW
SHRegSetPathW
PathFindExtensionA
PathAppendA
PathAddExtensionW
PathFindFileNameA
UrlIsW
SHCreateStreamOnFileW
wvnsprintfW
PathCombineW
StrCmpNW
StrTrimW
StrNCatW
PathIsUNCW
PathCanonicalizeW
StrCmpIW
StrCatBuffA
PathStripToRootW
StrStrW
SHSetValueA
StrToIntExW
PathSetDlgItemPathW
PathCompactPathExW
PathGetCharTypeA
PathIsUNCServerShareW
PathGetDriveNumberW
SHDeleteKeyW
PathFindExtensionW
StrCmpW
StrFormatKBSizeW
PathFileExistsW
StrToIntW
PathIsFileSpecW
DllInit
DllInstall
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ