DllCanUnloadNow
DllGetClassObject
IAlloc
QueueMemory
Static task
static1
Behavioral task
behavioral1
Sample
3df27c99ad8b34c895762b24fbcee3ad_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3df27c99ad8b34c895762b24fbcee3ad_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
3df27c99ad8b34c895762b24fbcee3ad_JaffaCakes118
Size
816KB
MD5
3df27c99ad8b34c895762b24fbcee3ad
SHA1
0c815de345aa9631f47d9b87ddd34cdfb6e4da4e
SHA256
8e18f8ae059d08ca9dd86335c8846b2661cba0b8a0ac45d8dec95f11f1149c35
SHA512
d6ba1014ceb5e38626f88f2ef3a6e156cd97dc3372210605d9743565e05be46df69cdecd639e636d5ec418110a9bd2ecb8bf2d503e09b73c7ad0fdb108249119
SSDEEP
6144:lJ8cMVaFcKRgekWcDW+vGHDI57n1Tfw5G4EKJhixl6NkykCI/ZqOdcrcyPCZxwDg:ltMaF5RhkLvuDI57n1TfSYVRRq4DP3
Checks for missing Authenticode signature.
resource |
---|
3df27c99ad8b34c895762b24fbcee3ad_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
OutputDebugStringA
HeapAlloc
HeapFree
HeapCreate
HeapDestroy
GetCurrentProcess
GetLocalTime
GetTimeZoneInformation
GetComputerNameA
OpenProcess
DuplicateHandle
GetCurrentThread
ReleaseMutex
CreateMutexA
lstrcmpiA
CreateRemoteThread
WriteProcessMemory
VirtualAllocEx
WaitForMultipleObjects
OpenEventA
FormatMessageA
ResetEvent
GetVersionExA
RemoveDirectoryA
FileTimeToSystemTime
FileTimeToLocalFileTime
LocalFree
GetWindowsDirectoryA
GetShortPathNameA
CreateDirectoryA
SetEnvironmentVariableA
CompareStringW
GetModuleFileNameA
FlushFileBuffers
SetStdHandle
IsBadCodePtr
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
GetStringTypeW
GetStringTypeA
VirtualAlloc
VirtualFree
GetEnvironmentVariableA
HeapSize
HeapReAlloc
SetUnhandledExceptionFilter
LCMapStringW
LCMapStringA
UnhandledExceptionFilter
TerminateProcess
GetOEMCP
GetACP
GetCPInfo
ExitProcess
TlsGetValue
TlsFree
TlsAlloc
GetCommandLineA
GetSystemTimeAsFileTime
RaiseException
MoveFileA
GetSystemTime
ExitThread
TlsSetValue
CreateThread
RtlUnwind
GetFullPathNameA
MultiByteToWideChar
WideCharToMultiByte
IsBadReadPtr
IsBadWritePtr
lstrlenA
InterlockedDecrement
GetCurrentProcessId
DisableThreadLibraryCalls
SetLastError
CreateFileMappingA
MapViewOfFile
UnmapViewOfFile
SetFilePointer
SetEndOfFile
SetThreadPriority
SetFileAttributesA
GetCurrentDirectoryA
SetCurrentDirectoryA
TerminateThread
GetModuleHandleA
GetCurrentThreadId
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
GetFileAttributesA
FindFirstFileA
FindNextFileA
FindClose
GetLogicalDrives
GetDriveTypeA
GetVolumeInformationA
CopyFileA
SetFileTime
ReadFile
GetTempPathA
GetTempFileNameA
GetFileTime
WriteFile
CreateFileA
GetFileSize
GetFileInformationByHandle
GetDiskFreeSpaceA
GetLastError
SetEvent
InterlockedIncrement
Sleep
LoadLibraryA
GetProcAddress
FreeLibrary
CreateEventA
ResumeThread
WaitForSingleObject
CloseHandle
GetTickCount
GetVersion
DeleteFileA
CompareStringA
GetSystemDirectoryA
ExitWindowsEx
MessageBoxA
UnregisterHotKey
RegisterHotKey
GetKeyboardLayout
ToAsciiEx
CreatePopupMenu
AppendMenuA
TrackPopupMenu
LoadImageA
EnumDisplaySettingsA
SetWindowLongA
IsWindow
UnregisterClassA
DestroyWindow
DispatchMessageA
PostMessageA
GetForegroundWindow
PostQuitMessage
LoadCursorA
SetTimer
LoadIconA
DestroyMenu
GetKeyNameTextA
GetKeyState
GetAsyncKeyState
EnumWindows
GetDesktopWindow
GetProcessWindowStation
OpenWindowStationA
SetProcessWindowStation
FindWindowA
GetWindowThreadProcessId
CloseWindowStation
SetThreadDesktop
OpenDesktopA
GetThreadDesktop
OpenInputDesktop
GetUserObjectInformationA
CloseDesktop
LoadStringA
SendMessageA
SetDlgItemTextA
SetPropA
SetForegroundWindow
EndDialog
DialogBoxParamA
GetClassNameA
GetWindowRect
PostThreadMessageA
GetDC
ReleaseDC
KillTimer
GetCursorPos
wsprintfA
GetWindowLongA
DefWindowProcA
RegisterClassA
CreateWindowExA
GetMessageA
TranslateMessage
DeleteDC
SelectObject
CreateDIBSection
CreateDCA
CreateCompatibleDC
GetDeviceCaps
GdiFlush
BitBlt
CreateCompatibleBitmap
GetStockObject
DeleteObject
InitiateSystemShutdownA
OpenSCManagerA
OpenServiceA
CloseServiceHandle
DeleteService
RegDeleteKeyA
RegDeleteValueA
RegEnumValueA
RegEnumKeyExA
RegOpenKeyExA
LookupPrivilegeValueA
AdjustTokenPrivileges
RevertToSelf
GetSidLengthRequired
GetTokenInformation
LookupAccountSidA
ImpersonateLoggedOnUser
DuplicateToken
OpenProcessToken
GetUserNameA
RegCreateKeyExA
RegQueryValueExA
RegSetValueExA
RegCloseKey
SHGetPathFromIDListA
SHGetMalloc
ShellExecuteA
Shell_NotifyIconA
SHLoadInProc
SHGetSpecialFolderLocation
CoTaskMemFree
StringFromCLSID
CoCreateInstance
CoInitialize
DllCanUnloadNow
DllGetClassObject
IAlloc
QueueMemory
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ