DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
4737170b61d50aa86371ec2f652b436e_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
4737170b61d50aa86371ec2f652b436e_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
4737170b61d50aa86371ec2f652b436e_JaffaCakes118
Size
48KB
MD5
4737170b61d50aa86371ec2f652b436e
SHA1
f448f8b0db66d0a2a1e0ca231d12c25541089fba
SHA256
909ee4ee4e1122a2494d034df770c76945078dd947761606958932c2b28245be
SHA512
5fdc24025d6c105edb762618f65e47173ce092ea634f92468af08f879e17cd4e21c4ac92018fa0a1415a58514d06d03d469c25756d0333167cabda760b6a6e54
SSDEEP
768:8mxf8VHiVbn4fZmaKFD59g5ES0wy7PXZa8PRyv:8mxfOHibnure59Y6R708PQ
Checks for missing Authenticode signature.
resource |
---|
4737170b61d50aa86371ec2f652b436e_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
LeaveCriticalSection
EnterCriticalSection
Sleep
CreateThread
WideCharToMultiByte
lstrlenW
MultiByteToWideChar
lstrlenA
Process32Next
Process32First
GetModuleFileNameA
GetSystemDirectoryA
DisableThreadLibraryCalls
LoadLibraryA
DeleteCriticalSection
InterlockedIncrement
InterlockedDecrement
HeapAlloc
GetSystemInfo
GetVersionExA
HeapCreate
HeapDestroy
GetShortPathNameA
GetModuleHandleA
GetWindowsDirectoryA
GetLocalTime
GetProcAddress
GetCurrentProcessId
CreateEventA
GetLastError
CloseHandle
WritePrivateProfileStringA
DeleteFileA
InitializeCriticalSection
GetCommandLineW
CreateWindowExA
ShowWindow
RegisterClassExA
CallNextHookEx
FindWindowExA
TranslateMessage
DispatchMessageA
IsWindow
SetWindowTextA
SendMessageA
KillTimer
SetTimer
PostMessageA
DefWindowProcA
GetMessageA
RegSetValueExA
RegOpenKeyExA
RegCreateKeyExA
RegQueryValueExA
RegCloseKey
CommandLineToArgvW
CoCreateInstance
SysStringLen
LoadRegTypeLi
SysAllocString
VariantClear
SysFreeString
strrchr
strchr
_stricmp
fopen
fwrite
fclose
memcmp
free
_initterm
malloc
_adjust_fdiv
_strlwr
rand
memcpy
_purecall
strstr
strcmp
memset
strcpy
strcat
sprintf
_access
strlen
??3@YAXPAX@Z
??2@YAPAXI@Z
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ