DllCanUnloadNow
DllGetClassObject
s
Static task
static1
Behavioral task
behavioral1
Sample
4545e8a283b1cc88186d4a1dfcf9d938_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
4545e8a283b1cc88186d4a1dfcf9d938_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
4545e8a283b1cc88186d4a1dfcf9d938_JaffaCakes118
Size
57KB
MD5
4545e8a283b1cc88186d4a1dfcf9d938
SHA1
41ee85f6cff260180f686b20c9242afdfe8c9dc2
SHA256
91772865700425b281d5f08abb0ee9bdbec693a17a8503b8ba77cc496cc59e44
SHA512
be34a816045e9654a74455d1ae55b3958df74a2d6675e3dcbbb0c77183650f14d447542262d0cfdf12f3c99630fcde7ae82e1659928d4934d295cf115c264b15
SSDEEP
768:9uO4g5n7dIBdM35n+y/bYkPVmKlSsw4FjvWglDwprEGvfxVTIeDk3DR5R:9X4GFH/U4VmclvNlDMrEGXe3Fr
Checks for missing Authenticode signature.
resource |
---|
4545e8a283b1cc88186d4a1dfcf9d938_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
__dllonexit
??1type_info@@UAE@XZ
memcmp
atoi
wcsrchr
rand
srand
_initterm
strlen
mbstowcs
_itow
_onexit
memcpy
??3@YAXPAX@Z
??2@YAPAXI@Z
??_U@YAPAXI@Z
wcstombs
strcpy
??_V@YAXPAX@Z
memset
free
malloc
_amsg_exit
_adjust_fdiv
_except_handler3
?terminate@@YAXXZ
memmove
_XcptFilter
_itoa
strtok
_local_unwind2
DnsQuery_A
DnsRecordListFree
inet_addr
CloseHandle
GetVersionExA
WriteFile
CreateFileW
GetFileSize
VirtualAlloc
ReadFile
VirtualFree
CreateThread
lstrcpyW
lstrlenW
OpenMutexW
GetModuleFileNameW
WaitForMultipleObjects
GetExitCodeThread
SetFilePointer
CreateMutexW
WaitForSingleObject
ReleaseMutex
GetModuleFileNameA
lstrlenA
DisableThreadLibraryCalls
ExitProcess
LoadLibraryW
lstrcpyA
GetSystemTimeAsFileTime
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
lstrcatW
LeaveCriticalSection
TerminateThread
GetLastError
GetProcAddress
GetModuleHandleA
OpenProcess
RaiseException
VirtualAllocEx
WriteProcessMemory
CreateRemoteThread
VirtualFreeEx
CreateToolhelp32Snapshot
Process32First
DeviceIoControl
Process32Next
GetCurrentProcess
lstrcmpiW
GetWindowsDirectoryA
GetVolumeInformationA
GetSystemTime
SystemTimeToFileTime
LoadLibraryA
GetTickCount
GetLogicalDriveStringsW
CreateFileA
DeleteFileW
GetCurrentThreadId
CreateDirectoryW
LocalFree
CreateProcessW
FreeLibrary
GetCurrentThread
SetFileTime
CreateEventW
TerminateProcess
DeleteFileA
WideCharToMultiByte
HeapAlloc
GetProcessHeap
HeapFree
SetFileAttributesW
InterlockedIncrement
InterlockedDecrement
GetVersion
InterlockedExchange
InterlockedCompareExchange
RtlUnwind
QueryPerformanceCounter
GetCurrentProcessId
UnhandledExceptionFilter
SetUnhandledExceptionFilter
lstrcmpiA
lstrcatA
Sleep
GetDriveTypeW
GetSystemMetrics
PostMessageA
CallNextHookEx
SetWindowsHookExA
CharUpperW
OpenProcessToken
RegOpenKeyExA
StartServiceA
QueryServiceStatusEx
QueryServiceConfigA
CloseServiceHandle
RegQueryValueExW
ConvertSidToStringSidW
IsValidSid
SetThreadToken
GetLengthSid
SetTokenInformation
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
FreeSid
CheckTokenMembership
AllocateAndInitializeSid
RegOpenKeyExW
ChangeServiceConfigA
ControlService
OpenServiceA
OpenSCManagerA
RegSetValueExW
DuplicateTokenEx
RegFlushKey
SetSecurityInfo
SetEntriesInAclA
RegCreateKeyExW
AdjustTokenPrivileges
GetTokenInformation
RegCloseKey
LookupPrivilegeValueA
SHGetFolderPathA
SHGetFolderPathW
CoCreateGuid
CoUninitialize
CoInitialize
CoCreateInstance
CoTaskMemFree
SysStringLen
VariantClear
SysAllocString
VariantInit
DllCanUnloadNow
DllGetClassObject
s
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ