CreateUSD
DeleteUSD
DllCanUnloadNow
DllGetClassObject
DllMain
Static task
static1
Behavioral task
behavioral1
Sample
42c8362cb81bd220de2da30754125663_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
42c8362cb81bd220de2da30754125663_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
42c8362cb81bd220de2da30754125663_JaffaCakes118
Size
80KB
MD5
42c8362cb81bd220de2da30754125663
SHA1
85b5d5be0a68a802b0a0173fbd7b54f352c09934
SHA256
6c5e58c734f0dbba9c3098c05bc56f6ea9fd8237f3536f08097d6d866e0eb8dd
SHA512
8eac8778c4969b40b837f2cec9846484ca38b2c81bb7f9f00b25a33084e199e374c53a1431e2e934f7454be65120385f766f7f22c3370ad173633c00bebcd65b
SSDEEP
1536:jgFmdmatkdfqn6JpQwAtjyaMowZKlL/FYZP:EJtJ2pgaDwZKlL/FY
Checks for missing Authenticode signature.
resource |
---|
42c8362cb81bd220de2da30754125663_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
ord823
ord825
GetVersion
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
RtlUnwind
OutputDebugStringA
InterlockedCompareExchange
InterlockedExchange
DisableThreadLibraryCalls
GetTempPathA
lstrlenA
MultiByteToWideChar
GetProcessHeap
HeapAlloc
HeapFree
CreateThread
SetEvent
TerminateThread
ResetEvent
lstrcmpA
FreeLibrary
GetSystemDirectoryA
LoadLibraryA
GetProcAddress
WaitForSingleObject
ReleaseMutex
Sleep
OpenMutexA
CreateMutexA
InitializeCriticalSection
CreateEventA
WideCharToMultiByte
GetWindowsDirectoryA
GetSystemDefaultLangID
CloseHandle
DeleteCriticalSection
InterlockedDecrement
InterlockedIncrement
LeaveCriticalSection
EnterCriticalSection
RegCreateKeyExA
RegDeleteValueA
RegFlushKey
RegEnumValueA
RegQueryValueExA
RegSetValueExA
RegOpenKeyExA
RegCloseKey
CoTaskMemFree
CoTaskMemAlloc
SysFreeString
SysAllocString
CreateUSD
DeleteUSD
DllCanUnloadNow
DllGetClassObject
DllMain
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ