DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
4bb42d8afd74724e9522d991c07477f8_JaffaCakes118.dll
Resource
win7-20240708-en
Target
4bb42d8afd74724e9522d991c07477f8_JaffaCakes118
Size
100KB
MD5
4bb42d8afd74724e9522d991c07477f8
SHA1
93f5fbf40e8272295e0a52e29bc41f575e126594
SHA256
51884ec5c2cbd72be398051c92b2186cd29f11898c572d7b9eb9546da86fb0e8
SHA512
b93fba662cf64b3f7bffb7994d8b5514f68dcd137b4fa7972119008924d13ae5b2f0c33dce16c70c229768b533b32203a4686888042e95688d14210a66990630
SSDEEP
1536:Czp7LCcvkvNVxrd4xA9+/6/4JkECc9LfsWIB:CzpvQNVxrd4xA9+/6ATLfsWI
Checks for missing Authenticode signature.
resource |
---|
4bb42d8afd74724e9522d991c07477f8_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
bind
listen
accept
send
select
recv
WSAStartup
gethostbyname
htons
connect
socket
closesocket
GetCurrentThreadId
MultiByteToWideChar
SetEvent
ReadFile
GetFileSize
CreateFileA
GetCurrentProcess
SetFileTime
WriteFile
MoveFileA
DeleteFileA
GetFileTime
Sleep
FindNextFileA
SetFilePointer
FindFirstFileA
GetModuleFileNameA
SetFileAttributesA
GetTempPathA
QueryPerformanceCounter
SetEndOfFile
CreateEventA
OpenEventA
GetLastError
lstrlenW
DisableThreadLibraryCalls
DeleteCriticalSection
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
InterlockedExchange
lstrlenA
lstrcmpA
InterlockedIncrement
lstrcpyA
GetProcAddress
LoadLibraryA
LocalFree
LocalAlloc
GetSystemDirectoryA
CloseHandle
Thread32Next
Thread32First
CreateToolhelp32Snapshot
GetCurrentProcessId
ExitThread
FreeLibrary
CreateThread
WideCharToMultiByte
GetTickCount
GetTempPathW
RaiseException
ResetEvent
WaitForSingleObject
GetModuleHandleA
lstrcatA
InterlockedDecrement
ExitWindowsEx
GetDC
ReleaseDC
FillRect
SetTimer
GetMessageA
TranslateMessage
DispatchMessageA
DrawTextA
wsprintfA
DrawTextW
AttachThreadInput
GetKeyboardState
GetKeyboardLayout
ToAsciiEx
GetCursorPos
ScreenToClient
RegisterWindowMessageA
SendMessageTimeoutA
CallNextHookEx
GetWindowThreadProcessId
SetWindowsHookExA
UnhookWindowsHookEx
KillTimer
wsprintfW
EnumThreadWindows
IsWindowVisible
GetAncestor
GetSystemMetrics
SendMessageA
WindowFromPoint
GetClassNameA
GetForegroundWindow
CreateSolidBrush
CreateFontIndirectA
CreateCompatibleDC
SetTextColor
SetBkColor
CreateCompatibleBitmap
BitBlt
SelectObject
DeleteDC
DeleteObject
GetUserNameA
RegQueryValueExA
RegEnumValueA
IsTextUnicode
RegEnumKeyExA
RegOpenKeyExA
RegFlushKey
RegSetValueExA
RegCreateKeyExA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegCloseKey
RegDeleteValueA
RegDeleteKeyA
CoInitialize
CoUninitialize
CLSIDFromString
LoadRegTypeLi
SysStringLen
VariantCopy
VariantInit
VariantClear
SysFreeString
SysAllocString
GetErrorInfo
ord23
ord58
ord30
ord32
ord57
ord18
ord15
ord31
ord21
ord16
free
atoi
wcscmp
rand
__CxxFrameHandler
sprintf
strstr
strncpy
strchr
_strupr
wcslen
isdigit
isalpha
??2@YAPAXI@Z
srand
strrchr
_purecall
_except_handler3
fclose
fread
fopen
fwrite
_EH_prolog
memcpy
strlen
strcpy
realloc
_mbsnbicmp
memmove
_mbsstr
_mbsnbcmp
_mbsicmp
fseek
_strnicmp
?terminate@@YAXXZ
malloc
strncat
??3@YAXPAX@Z
__dllonexit
_onexit
_initterm
_adjust_fdiv
??1type_info@@UAE@XZ
_CxxThrowException
time
_strlwr
_itoa
ftell
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ