DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
gettextadvert
Static task
static1
Behavioral task
behavioral1
Sample
47f7ededd6699a516f4c84efc3350ebb_JaffaCakes118.dll
Resource
win7-20240704-en
Target
47f7ededd6699a516f4c84efc3350ebb_JaffaCakes118
Size
477KB
MD5
47f7ededd6699a516f4c84efc3350ebb
SHA1
66daf18f3a6672908589cf17aa43671d13fbd64c
SHA256
0c998d5004e3a73177073f9fdd1e481c98c4bdd7e2bb900a09b2c4f40148e5ca
SHA512
c23baaae4da4f1efb4dd57c1f05f3e6b23c822002f1121c228403ea9a83731ba388cf26aee8e59dac9353ccc5de0b57186d701a1170ab13fdc5710a95e398dcb
SSDEEP
12288:0zDtLRjgPp57q9Tt3l2Nutg/cnmQPVKFgKFbvivN1Fb5ZS/HWwNxaj50qr9SeETh:yDtLRjopkKD
Checks for missing Authenticode signature.
resource |
---|
47f7ededd6699a516f4c84efc3350ebb_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
lstrlenW
MultiByteToWideChar
lstrlenA
CloseHandle
WriteFile
CreateFileW
FreeLibrary
LoadLibraryExW
RaiseException
lstrcmpiW
GetModuleFileNameW
InterlockedIncrement
InterlockedDecrement
WideCharToMultiByte
SetThreadLocale
GetThreadLocale
CreateThread
GetVersionExW
DeleteFileW
GetProcAddress
LoadLibraryW
FlushFileBuffers
GetTickCount
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
FindResourceW
LoadResource
LockResource
SizeofResource
GetModuleHandleW
GetLastError
CreateFileA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
GetConsoleMode
GetConsoleCP
SetFilePointer
GetCurrentProcessId
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
SetHandleCount
InterlockedExchange
GetOEMCP
GetACP
GetCPInfo
GetModuleFileNameA
GetStdHandle
ExitProcess
HeapSize
Sleep
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
LoadLibraryA
HeapFree
HeapAlloc
HeapReAlloc
RtlUnwind
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCommandLineA
GetVersionExA
GetProcessHeap
GetModuleHandleA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
CharLowerA
CharNextW
wsprintfW
UnregisterClassA
IsTextUnicode
RegEnumKeyExW
RegQueryInfoKeyW
RegSetValueExW
RegOpenKeyExW
RegCreateKeyExW
RegCloseKey
RegDeleteValueW
RegDeleteKeyW
RegQueryValueExW
SHGetFolderPathW
CoTaskMemFree
CoGetClassObject
StringFromGUID2
CoTaskMemAlloc
CoTaskMemRealloc
CoCreateInstance
VarBstrCat
SysAllocStringLen
SysFreeString
SysAllocString
SysAllocStringByteLen
SysStringByteLen
SysStringLen
LoadTypeLi
UnRegisterTypeLi
RegisterTypeLi
VarUI4FromStr
VarBstrCmp
LoadRegTypeLi
NdrStubForwardingFunction
NdrOleFree
NdrOleAllocate
IUnknown_Release_Proxy
IUnknown_AddRef_Proxy
IUnknown_QueryInterface_Proxy
NdrDllGetClassObject
NdrDllCanUnloadNow
NdrCStdStubBuffer2_Release
NdrDllRegisterProxy
NdrDllUnregisterProxy
InternetSetCookieW
InternetCrackUrlW
InternetGetCookieW
CoInternetGetSession
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
gettextadvert
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ