DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
ID
InitO
Behavioral task
behavioral1
Sample
3e6c293281c9c5692fd103bb80bb5719_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3e6c293281c9c5692fd103bb80bb5719_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
3e6c293281c9c5692fd103bb80bb5719_JaffaCakes118
Size
111KB
MD5
3e6c293281c9c5692fd103bb80bb5719
SHA1
02e4cf0a2e787d148661a1a8f54973546583f7d0
SHA256
3e2608d626d78416852686c12bdf22fb1b1eccef646721fc26d1c993cada43b9
SHA512
d38538514443c9eb59c19cce6f5085fd5f5e2bd9353dcbf69c15635274f06ff4207898cc3a1480a9174ba8a8b91e43b0ffd1fca41a6c716bdd433e0f1d97e3e5
SSDEEP
768:RVgL9eq0mdN3h3KakteB97of1AyAKL3DK10Jn9wUIhvZR+P+pv6j/niZ4DaS9egW:QQtmnx6aKOyAEDKSrILye6LJ2ViK
resource | yara_rule |
---|---|
sample | upx |
Checks for missing Authenticode signature.
resource |
---|
3e6c293281c9c5692fd103bb80bb5719_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
WaitForSingleObject
ReleaseMutex
MoveFileA
GetLastError
Sleep
CreateDirectoryA
GetModuleHandleA
GetLogicalDrives
GetTickCount
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InterlockedIncrement
InterlockedDecrement
InitializeCriticalSection
DisableThreadLibraryCalls
lstrlenA
MultiByteToWideChar
lstrlenW
WideCharToMultiByte
GetStockObject
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
??8std@@YA_NABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@PBD@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??9std@@YA_NABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@PBD@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?substr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBE?AV12@II@Z
?_Freeze@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
_purecall
??2@YAPAXI@Z
_beginthreadex
strrchr
fseek
_strupr
strtok
strchr
_vsnprintf
atoi
free
__dllonexit
_onexit
_except_handler3
?terminate@@YAXXZ
_initterm
malloc
_adjust_fdiv
_strlwr
_ltoa
_unlink
__CxxFrameHandler
memset
memcpy
strlen
memcmp
strcat
isalnum
strcpy
strstr
strncpy
LoadCursorA
RegisterClassA
CreateWindowExA
GetMessageA
TranslateMessage
DispatchMessageA
DefWindowProcA
SendMessageA
FindWindowExA
wsprintfA
IsCharAlphaNumericA
LoadIconA
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
ID
InitO
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE