DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
4b38210d548ce3d701523a7b8b9dfa65_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
4b38210d548ce3d701523a7b8b9dfa65_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
4b38210d548ce3d701523a7b8b9dfa65_JaffaCakes118
Size
52KB
MD5
4b38210d548ce3d701523a7b8b9dfa65
SHA1
a4d8831ee970d6916144432cc0b52a0c111ae0c0
SHA256
2d4f6ee0090c0fa4f0293442fed378acf9959a9b3adacd0231476d46e1860cc5
SHA512
9d6ebf5b23ca3a404177b66b9f3914a6f81b2b04fe47f85f9913faf614a1955ff3b5905ebab1dd2f68ebf7910c1ae35eace5d53efdfd0a9bb397a263af009c48
SSDEEP
768:pA+RyWLZlkXNm331fjhD46BVK8jmPNQuLIgUId4cJa:G0LT1fR3BAvcgU52a
Checks for missing Authenticode signature.
resource |
---|
4b38210d548ce3d701523a7b8b9dfa65_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
SetLastError
LoadLibraryExW
GetModuleHandleA
GetProcAddress
GetFileAttributesW
GetVersion
OutputDebugStringA
LoadLibraryW
lstrcmpiW
lstrcpynW
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
GetLastError
DeleteCriticalSection
lstrcpyW
lstrcatW
InterlockedDecrement
InterlockedIncrement
Sleep
CreateThread
GetSystemDefaultLangID
GetPrivateProfileStringW
CloseHandle
CreateProcessW
OutputDebugStringW
FindResourceW
LoadResource
SizeofResource
lstrlenA
MultiByteToWideChar
FreeLibrary
GetModuleFileNameW
GetModuleHandleW
GetShortPathNameW
DisableThreadLibraryCalls
lstrlenW
HeapDestroy
CharNextW
RegisterWindowMessageW
GetMenuStringW
GetMenuItemID
EnableMenuItem
GetMenuItemCount
wsprintfW
InsertMenuW
RegDeleteValueW
RegDeleteKeyW
RegCloseKey
RegOpenKeyExW
RegEnumKeyExW
RegSetValueExW
RegQueryInfoKeyW
RegEnumValueW
RegQueryValueExA
RegOpenKeyExA
RegCreateKeyExW
ShellExecuteW
DragQueryFileW
CoTaskMemRealloc
CoTaskMemAlloc
ReleaseStgMedium
CoCreateInstance
CoTaskMemFree
LoadRegTypeLi
RegisterTypeLi
LoadTypeLi
SysAllocString
SysFreeString
VarUI4FromStr
SysStringLen
?_C@?1??_Nullstr@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@CAPBGXZ@4GB
??1?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QAE@XZ
?_Tidy@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@AAEX_N@Z
?assign@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QAEAAV12@PBGI@Z
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??1_Winit@std@@QAE@XZ
??0_Winit@std@@QAE@XZ
??1Init@ios_base@std@@QAE@XZ
??0Init@ios_base@std@@QAE@XZ
?append@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QAEAAV12@PBGI@Z
??1CFlexibleHeader@@QAE@XZ
??0CFlexibleHeader@@QAE@XZ
?IsAcapFile@CFlexibleHeader@@QAE_NPBGKKK@Z
__CxxFrameHandler
strrchr
strncpy
strcpy
wcscpy
swprintf
wcsstr
malloc
memcpy
wcslen
strlen
_except_handler3
memset
??2@YAPAXI@Z
memcmp
realloc
_adjust_fdiv
_initterm
?terminate@@YAXXZ
_onexit
__dllonexit
vswprintf
wcsncpy
wcscat
free
_wtoi
_purecall
PathRemoveFileSpecW
PathFileExistsW
PathRemoveBackslashA
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ