DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
49771a3bad6cc214819d8c8f99d69e44_JaffaCakes118.dll
Resource
win7-20240704-en
Target
49771a3bad6cc214819d8c8f99d69e44_JaffaCakes118
Size
208KB
MD5
49771a3bad6cc214819d8c8f99d69e44
SHA1
6e6c9e28c47a33f47a0436eb156a905a8e10bd4b
SHA256
9be9152459f376dd2719e6e40c8c2b1015a6c98d7e8d4fe3fb5450e71bf08393
SHA512
56ae6424a63092c54b9a883176d1aca11f15757da97357e82efc00937641ebb926524d398f40f2c594480060365cbe707682f3a36fbedb6fc4405165eebf7ae0
SSDEEP
3072:gz0Up1VYik5/NJueo9W3SvrGMx/il23MpwecxStW5w2IT2PilpLO8PjTl:gz0K3Emeo9RDZcpwechtIaPe5
Checks for missing Authenticode signature.
resource |
---|
49771a3bad6cc214819d8c8f99d69e44_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
VerQueryValueA
GetFileVersionInfoA
GetFileVersionInfoSizeA
EnterCriticalSection
LeaveCriticalSection
CloseHandle
MoveFileExA
ReadFile
RaiseException
lstrlenW
MultiByteToWideChar
lstrlenA
InitializeCriticalSection
DeleteCriticalSection
InterlockedIncrement
InterlockedDecrement
WideCharToMultiByte
InterlockedExchange
GetACP
GetLocaleInfoA
GetThreadLocale
GetVersionExA
FindResourceA
SizeofResource
LockResource
LoadResource
FindResourceExA
lstrcatA
lstrcpyA
WriteFile
CreateMutexA
SetStdHandle
IsBadCodePtr
IsBadReadPtr
LoadLibraryA
SetUnhandledExceptionFilter
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
UnhandledExceptionFilter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
SetFilePointer
CreateFileA
GetSystemDirectoryA
GetModuleFileNameA
GetLastError
LoadLibraryExA
lstrcpynA
FreeLibrary
IsDBCSLeadByte
lstrcmpiA
TerminateThread
Sleep
GetModuleHandleA
CreateThread
FlushFileBuffers
HeapCreate
LCMapStringW
LCMapStringA
GetStringTypeW
GetStringTypeA
GetCPInfo
GetOEMCP
RtlUnwind
ExitProcess
GetCommandLineA
GetCurrentThreadId
VirtualQuery
GetSystemInfo
VirtualAlloc
VirtualProtect
GetProcessHeap
HeapSize
HeapReAlloc
HeapFree
HeapAlloc
HeapDestroy
IsBadWritePtr
TlsAlloc
SetLastError
TlsFree
TlsSetValue
TlsGetValue
GetProcAddress
GetCurrentProcess
TerminateProcess
VirtualFree
BringWindowToTop
CharNextA
GetClassNameA
GetDC
GetParent
EnumChildWindows
FindWindowExA
GetWindowRect
InflateRect
LoadBitmapA
ReleaseDC
SendMessageA
SetWindowPos
UnhookWindowsHookEx
SetWindowsHookExA
CallNextHookEx
DestroyWindow
EnableWindow
ShowWindow
CreateCompatibleBitmap
GetObjectA
SelectObject
DeleteObject
DeleteDC
CreateCompatibleDC
BitBlt
GetDIBits
RegSetValueExA
RegDeleteValueA
RegCloseKey
RegCreateKeyExA
RegOpenKeyExA
RegQueryInfoKeyA
RegEnumKeyExA
RegDeleteKeyA
RegQueryValueExA
ShellExecuteA
CoCreateInstance
StringFromGUID2
CoTaskMemAlloc
CoTaskMemRealloc
CoTaskMemFree
UnRegisterTypeLi
RegisterTypeLi
SafeArrayUnlock
SafeArrayLock
SafeArrayDestroy
SafeArrayCopy
SafeArrayRedim
SafeArrayGetUBound
SafeArrayGetLBound
LoadTypeLi
LoadRegTypeLi
SysFreeString
SysStringLen
SysStringByteLen
VariantCopy
SafeArrayGetVartype
SysAllocString
VariantChangeType
VariantClear
SysAllocStringLen
VarUI4FromStr
PathFindExtensionA
InternetConnectA
InternetCloseHandle
InternetOpenUrlA
InternetReadFile
HttpSendRequestA
HttpOpenRequestA
InternetOpenA
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ