DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
434d3ea797dfec583dc4527b493f5bc4_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
434d3ea797dfec583dc4527b493f5bc4_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
434d3ea797dfec583dc4527b493f5bc4_JaffaCakes118
Size
232KB
MD5
434d3ea797dfec583dc4527b493f5bc4
SHA1
8c2eac2aade8b45e670e5b931308bfa010d0aa78
SHA256
4937bce72375c742a9abdcc1a12b0e78712b2c2155438d889d72663ce8669636
SHA512
84c7eba3c1d5c7a87281a1fa8586b7b861b6349940ef321f44095cb0eb24b3b587d1572fd7068c254611dd576593d726a50e9b6aeb099587d01bcb0a8e4eff07
SSDEEP
3072:R2APCWlQz+uPHcRB1UhF87K+3f5Tq4a2hGzozas+K4KZ+mqI7FOdcc3w3U:gWli+M+3fZgzoF+KdZ+aFOdjwk
Checks for missing Authenticode signature.
resource |
---|
434d3ea797dfec583dc4527b493f5bc4_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
InterlockedDecrement
MultiByteToWideChar
GetModuleFileNameA
GetLastError
WideCharToMultiByte
lstrlenW
SizeofResource
LoadResource
FindResourceA
LoadLibraryExA
lstrcmpiA
lstrcpynA
IsDBCSLeadByte
GetModuleHandleA
lstrcatA
lstrcmpiW
FreeResource
ExitProcess
lstrcatW
EnterCriticalSection
GetVolumeInformationA
CreateProcessA
CloseHandle
TerminateThread
WaitForSingleObject
CreateThread
SetFileTime
WriteFile
GetFileTime
CreateFileA
FlushFileBuffers
LeaveCriticalSection
VirtualQuery
GetSystemInfo
VirtualProtect
LCMapStringW
LCMapStringA
SetFilePointer
GetStringTypeW
GetStringTypeA
lstrcpyW
InterlockedIncrement
DeleteCriticalSection
InitializeCriticalSection
GetThreadLocale
GetLocaleInfoA
GetACP
GetVersionExA
InterlockedExchange
LoadLibraryA
GetProcAddress
FreeLibrary
lstrlenA
lstrcpyA
Sleep
GetCPInfo
GetOEMCP
IsBadCodePtr
IsBadReadPtr
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
SetUnhandledExceptionFilter
IsBadWritePtr
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
TlsAlloc
TlsGetValue
SetStdHandle
DisableThreadLibraryCalls
RtlUnwind
HeapFree
RaiseException
HeapReAlloc
HeapAlloc
GetSystemTimeAsFileTime
GetCurrentThreadId
TlsSetValue
GetCommandLineA
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
TerminateProcess
GetCurrentProcess
HeapSize
TlsFree
SetLastError
CreateDialogParamA
SetTimer
CharNextA
wsprintfA
GetDoubleClickTime
KillTimer
wsprintfW
IsWindowVisible
EnumWindows
LoadStringA
GetBkColor
RegCreateKeyA
RegOpenKeyA
RegQueryInfoKeyA
RegEnumKeyExA
RegCreateKeyExA
RegDeleteValueA
RegQueryValueExA
RegEnumKeyA
RegOpenKeyExA
RegCloseKey
RegDeleteKeyA
RegSetValueExA
ShellExecuteA
SHGetSpecialFolderPathA
StringFromGUID2
CoCreateInstance
CoTaskMemFree
CoTaskMemAlloc
StringFromCLSID
CoTaskMemRealloc
LoadTypeLi
DispCallFunc
SafeArrayAccessData
SafeArrayGetLBound
SafeArrayGetUBound
SafeArrayUnaccessData
SysStringLen
LoadRegTypeLi
UnRegisterTypeLi
VariantInit
SysAllocString
RegisterTypeLi
SysFreeString
VarUI4FromStr
VariantClear
PathFindExtensionA
InitCommonControlsEx
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ