DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
44dd4e96591173c7a21f3c99a0ed09b3_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
44dd4e96591173c7a21f3c99a0ed09b3_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
44dd4e96591173c7a21f3c99a0ed09b3_JaffaCakes118
Size
236KB
MD5
44dd4e96591173c7a21f3c99a0ed09b3
SHA1
d3e99bdc2b612bc98cd959cd4b0e6c98962e6c0f
SHA256
f0d8181145c6f4b06186779403ebef0fdc56516fa0c4dbd8d01ca3ed9c87f750
SHA512
4fff53aea5cf91f85acee468e6f902b229b0eede7a96216c1df8d7652359c7077f3e021d769e336fa33acfd09fd60c832c68ef776373466024eea7edcc796fbe
SSDEEP
3072:ART+V0SFseNgnBRVP05ksNPw6TrsAkZ9oJcJa8aPgZAk1ZVvtRATk:Ad+VdFse6RVPEkMwMTcdbZAk1ZtGk
Checks for missing Authenticode signature.
resource |
---|
44dd4e96591173c7a21f3c99a0ed09b3_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
InitializeCriticalSection
LeaveCriticalSection
InterlockedIncrement
InterlockedDecrement
FreeLibrary
lstrcmpiW
LoadLibraryExW
GetModuleHandleW
CreateFileW
DeleteFileA
FlushFileBuffers
GetCurrentProcessId
GetFileAttributesW
GetLastError
VirtualQuery
LoadLibraryW
GetProcAddress
lstrlenA
lstrcpyA
GetTempPathA
WideCharToMultiByte
CreateMutexW
GetCurrentProcess
GlobalLock
OpenProcess
Sleep
lstrcmpW
GlobalUnlock
EnterCriticalSection
InterlockedExchangeAdd
DuplicateHandle
ReadFile
SetFilePointer
InterlockedExchange
SetEnvironmentVariableA
CompareStringW
CompareStringA
GetStringTypeW
GetStringTypeA
LoadLibraryA
GetTickCount
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
MultiByteToWideChar
RaiseException
DeleteCriticalSection
FindResourceExW
LoadResource
LockResource
GetVersionExW
SizeofResource
GetModuleFileNameW
CloseHandle
WriteFile
CreateFileA
lstrcatA
lstrcpynA
GetModuleHandleA
GetModuleFileNameA
FindResourceW
lstrlenW
OpenMutexW
GetTimeZoneInformation
GetDateFormatA
GetTimeFormatA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
TlsSetValue
TlsAlloc
TlsGetValue
RtlUnwind
GetCommandLineA
GetCurrentThreadId
GetSystemInfo
VirtualAlloc
VirtualProtect
GetSystemTimeAsFileTime
GetConsoleMode
GetConsoleCP
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetThreadLocale
GetLocaleInfoA
GetACP
GetVersionExA
GetProcessHeap
HeapSize
HeapReAlloc
HeapFree
GetStartupInfoA
SetHandleCount
GetFileType
LCMapStringW
LCMapStringA
GetOEMCP
GetCPInfo
GetStdHandle
HeapCreate
VirtualFree
ExitProcess
SetLastError
HeapAlloc
HeapDestroy
TlsFree
SetWindowLongW
SetTimer
KillTimer
GetParent
CallWindowProcW
CharNextW
UnhookWindowsHookEx
GetWindow
GetClassNameW
FindWindowExW
GetWindowLongW
GetKeyboardLayout
GetTopWindow
SendMessageW
UnregisterClassA
PtInRect
RegisterWindowMessageW
DeleteObject
StretchBlt
SelectObject
DeleteDC
CreateCompatibleDC
CreateDIBSection
GetObjectW
GetDIBColorTable
RegQueryValueExW
RegDeleteValueW
RegOpenKeyExW
RegEnumKeyExW
RegQueryInfoKeyW
RegDeleteKeyW
RegCloseKey
RegSetValueExW
RegCreateKeyExW
SHGetSpecialFolderPathW
CoTaskMemAlloc
CoTaskMemRealloc
CoTaskMemFree
CoCreateInstance
SysAllocString
VariantChangeType
SysReAllocStringLen
SafeArrayUnlock
SafeArrayLock
SafeArrayDestroy
DispCallFunc
SafeArrayGetUBound
SafeArrayGetLBound
SafeArrayGetVartype
LoadRegTypeLi
SysStringLen
VarBstrCat
VarBstrCmp
SysAllocStringByteLen
SysStringByteLen
SysAllocStringLen
VariantCopy
VariantClear
VariantInit
SysFreeString
VarUI4FromStr
LoadTypeLi
PathFindExtensionW
GdipCreateBitmapFromScan0
GdiplusStartup
GdipGetImageEncodersSize
GdipGetImageEncoders
GdipFree
GdiplusShutdown
GdipSaveImageToFile
GdipCreateBitmapFromHBITMAP
GdipDisposeImage
GdipAlloc
GdipCloneImage
TransparentBlt
AlphaBlend
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ