DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
3bf44aac0f2e642719c54106694af4f8_JaffaCakes118.dll
Resource
win7-20240704-en
Target
3bf44aac0f2e642719c54106694af4f8_JaffaCakes118
Size
232KB
MD5
3bf44aac0f2e642719c54106694af4f8
SHA1
65a9b82a8c995480ad2c5848a13c01550361bba2
SHA256
f4fe9d143615087fd1be2ae2ab44fca7392da7dece7955892b0a5f74d493b926
SHA512
a710af3c163f2287e92f6acd8c09e2482ff593b12607368e682e1b77c89926ce9c828dd0c4ef3fec51ee5b4b1480bc4f29bab25527b23efe8b305b02e608ada5
SSDEEP
3072:hFI1SlODvZfkeOz54fnUprPLxs+7CATCm0i9Di6nUL7C6wuQi7PwRZwxEOThG/fj:WSlKfz6SL2xCPwRw50189q
Checks for missing Authenticode signature.
resource |
---|
3bf44aac0f2e642719c54106694af4f8_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetProcAddress
LoadLibraryA
LocalFree
Process32Next
Process32First
CreateToolhelp32Snapshot
VirtualFreeEx
WaitForSingleObject
CreateRemoteThread
GetModuleHandleA
WriteProcessMemory
VirtualAllocEx
OpenProcess
CreateProcessA
CopyFileA
CreateMutexA
OpenMutexA
TerminateThread
DisableThreadLibraryCalls
GetModuleFileNameA
HeapAlloc
GetSystemInfo
GetVersionExA
FreeLibrary
InitializeCriticalSection
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
CompareStringW
CompareStringA
FlushFileBuffers
SetStdHandle
GetStringTypeW
GetThreadLocale
IsBadCodePtr
IsBadReadPtr
IsBadWritePtr
VirtualAlloc
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
HeapCreate
ReadFile
GetStringTypeExA
OutputDebugStringA
DebugBreak
InterlockedDecrement
GetTickCount
GetTempPathA
GetTempFileNameA
Sleep
lstrcmpA
InterlockedIncrement
MultiByteToWideChar
lstrlenW
WideCharToMultiByte
CloseHandle
CreateThread
GetLocalTime
GetEnvironmentVariableA
CreateDirectoryA
FindFirstFileA
VirtualFree
HeapDestroy
LCMapStringW
LCMapStringA
GetOEMCP
GetACP
GetCPInfo
HeapSize
GetCurrentProcess
TerminateProcess
ExitProcess
HeapReAlloc
SetUnhandledExceptionFilter
HeapFree
GetVersion
GetCommandLineA
GetSystemTime
GetTimeZoneInformation
SetCurrentDirectoryA
GetCurrentDirectoryA
SetEnvironmentVariableA
RaiseException
RtlUnwind
GetLastError
GetFileAttributesA
DeleteFileA
FindNextFileA
FindClose
lstrlenA
SetFilePointer
WriteFile
CreateFileA
GetFileSize
GetStringTypeA
SetWindowLongA
CharNextA
LoadStringA
SetTimer
DestroyWindow
SendMessageA
KillTimer
BringWindowToTop
SetFocus
SetForegroundWindow
SetActiveWindow
SetWindowPos
CharLowerA
ShowWindow
ReleaseDC
GetDC
wsprintfW
GetWindowLongA
wvsprintfA
GetDeviceCaps
CryptDestroyHash
RegEnumKeyExA
RegQueryInfoKeyA
RegOpenKeyExA
RegCreateKeyExA
RegDeleteKeyA
RegSetValueExA
RegQueryValueExA
CryptAcquireContextA
CryptCreateHash
CryptHashData
CryptGetHashParam
CryptReleaseContext
RegCloseKey
CoCreateInstance
CoInitialize
CoUninitialize
SysFreeString
SysAllocStringLen
VariantClear
SysAllocString
VariantCopy
VariantChangeType
SysStringLen
LoadRegTypeLi
InternetOpenUrlA
InternetCrackUrlA
InternetReadFile
HttpQueryInfoA
HttpOpenRequestA
HttpAddRequestHeadersA
HttpSendRequestA
InternetOpenA
InternetConnectA
InternetAttemptConnect
InternetCloseHandle
Netbios
URLDownloadToFileA
ord58
ord32
ord16
ord57
ord15
ord21
ord23
ord30
ord31
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ