DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Behavioral task
behavioral1
Sample
46da6494b54fe1033397b8cf77280757_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
46da6494b54fe1033397b8cf77280757_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
46da6494b54fe1033397b8cf77280757_JaffaCakes118
Size
231KB
MD5
46da6494b54fe1033397b8cf77280757
SHA1
e9f09483e268b5e90afe964e8ed1420bebdc738e
SHA256
fb632db0f3476921510d02f4bf046ef73719807394905ba008b89f107e602bde
SHA512
3b25b93520d8122ba3016b5dfe91f4ee8d8c93994f58b46b406a3cc532315a0a432c20870e154d257bd8f76a943f16b54355ca9e0dce9296bda8d62da418d13a
SSDEEP
6144:/WnVxgn9Gy0aQx23KLCWkq6B5FecoB8+:OVOQm3K2bqf
resource | yara_rule |
---|---|
sample | upx |
Checks for missing Authenticode signature.
resource |
---|
46da6494b54fe1033397b8cf77280757_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
HeapFree
CreateFileA
GetLastError
FreeLibrary
OpenProcess
CloseHandle
WriteFile
GetProcessHeap
GetProcAddress
LoadLibraryA
GetVersionExA
SetLastError
HeapAlloc
GetDateFormatA
GetCurrentThread
lstrcmpiA
GetSystemDirectoryA
GetWindowsDirectoryA
GetTempFileNameA
GetTempPathA
MoveFileA
CopyFileA
GetFileSize
WaitForSingleObject
CreateProcessA
LoadLibraryExA
DeleteFileA
FileTimeToSystemTime
SystemTimeToFileTime
GetTimeFormatA
GetLocalTime
GetCurrentProcessId
Sleep
GetCurrentThreadId
EnterCriticalSection
InterlockedIncrement
InterlockedDecrement
HeapDestroy
LeaveCriticalSection
DeleteCriticalSection
GetModuleFileNameA
InitializeCriticalSection
DisableThreadLibraryCalls
MultiByteToWideChar
GetShortPathNameA
lstrlenA
TerminateProcess
GetCurrentProcess
lstrlenW
TlsFree
TlsGetValue
GetSystemTime
RaiseException
GetStringTypeW
GetStringTypeA
IsBadCodePtr
SetEnvironmentVariableA
IsBadWritePtr
VirtualAlloc
IsBadReadPtr
HeapCreate
GetEnvironmentStringsW
VirtualFree
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetEnvironmentStrings
GetFileType
GetStdHandle
GetStartupInfoA
HeapSize
CompareStringW
CompareStringA
SetEndOfFile
FlushFileBuffers
SetStdHandle
WideCharToMultiByte
LocalFree
RtlUnwind
ResumeThread
CreateThread
TlsSetValue
ExitThread
GetTimeZoneInformation
HeapReAlloc
SetHandleCount
ExitProcess
GetCommandLineA
GetVersion
TlsAlloc
LCMapStringA
LCMapStringW
GetCPInfo
GetACP
GetOEMCP
UnhandledExceptionFilter
ReadFile
SetUnhandledExceptionFilter
SetFilePointer
CryptHashData
CryptSignHashA
CryptCreateHash
CryptDestroyHash
CryptDestroyKey
CryptVerifySignatureA
OpenThreadToken
OpenProcessToken
CryptReleaseContext
AdjustTokenPrivileges
RegQueryInfoKeyA
LookupPrivilegeValueA
RegDeleteKeyA
RegDeleteValueA
RegEnumValueA
RegCreateKeyExA
RegOpenKeyExA
RegCloseKey
RegQueryValueExA
CryptImportKey
RegSetValueExA
CryptAcquireContextA
CoInitialize
CoUninitialize
CoCreateInstance
CoCreateGuid
ShellExecuteA
SetWindowPos
SetWindowTextA
InternetConnectA
InternetCloseHandle
HttpQueryInfoA
InternetReadFile
HttpSendRequestA
InternetOpenA
HttpOpenRequestA
InternetCrackUrlA
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE