DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
3eef784a96927114e535cbf2069c4f4c_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3eef784a96927114e535cbf2069c4f4c_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
3eef784a96927114e535cbf2069c4f4c_JaffaCakes118
Size
205KB
MD5
3eef784a96927114e535cbf2069c4f4c
SHA1
2b1db9fa565757c957c2e0c4469160c906ca7761
SHA256
f799aed115cce615fdefbc4db1d8023c5ba3633a24a2b66f4c6f10db92993f02
SHA512
393ec498116708d40ba42557f1b845c59c905474a8da345d18db220c999f171e1bb744a3c79172e6ffbb586781a66d239ee6bb1e98acc7ce9f253027a0979850
SSDEEP
6144:eE4ZjB8mzAJbFK+uke7aikwLYeOUquRBwHj:8ZjODbHuke7+0OUqsBw
Checks for missing Authenticode signature.
resource |
---|
3eef784a96927114e535cbf2069c4f4c_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
EnterCriticalSection
InterlockedDecrement
lstrlenW
GetShortPathNameW
GetModuleHandleW
GetModuleFileNameW
FreeLibrary
MultiByteToWideChar
lstrlenA
SizeofResource
LoadResource
FindResourceW
InterlockedIncrement
LoadLibraryExW
lstrcmpiW
lstrcpynW
HeapDestroy
GetProcAddress
LoadLibraryW
lstrcpyW
lstrcatW
SetEnvironmentVariableA
CompareStringW
CompareStringA
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
DisableThreadLibraryCalls
GlobalFindAtomW
GlobalAddAtomW
GetTempPathW
GetTempFileNameW
GetLastError
Sleep
LCMapStringW
LCMapStringA
GetStringTypeW
GetStringTypeA
LoadLibraryA
GetOEMCP
GetACP
GetCPInfo
WriteFile
GetEnvironmentStringsW
GetEnvironmentStrings
WideCharToMultiByte
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
ResumeThread
CreateThread
TlsSetValue
TlsGetValue
ExitThread
CloseHandle
GetTimeZoneInformation
GetSystemTime
GetLocalTime
HeapFree
HeapAlloc
HeapReAlloc
GetCommandLineA
GetVersion
GetCurrentThreadId
TlsAlloc
TlsFree
SetLastError
ExitProcess
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
RtlUnwind
GetModuleHandleA
GetModuleFileNameA
GetEnvironmentVariableA
GetVersionExA
HeapCreate
VirtualFree
VirtualAlloc
IsWindow
GetClientRect
CharNextW
RegQueryInfoKeyW
RegSetValueExW
RegEnumKeyExW
RegOpenKeyExW
RegCloseKey
RegDeleteValueW
RegCreateKeyExW
RegDeleteKeyW
RegEnumValueW
SHLoadInProc
ShellExecuteW
StringFromGUID2
CoTaskMemFree
CoTaskMemAlloc
CoTaskMemRealloc
CoCreateInstance
LoadTypeLi
LoadRegTypeLi
SysStringLen
SysFreeString
VarUI4FromStr
SysAllocString
RegisterTypeLi
VMProtectBegin
VMProtectEnd
URLDownloadToFileW
PathRenameExtensionW
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ