DllInit
DllInstall
Static task
static1
Behavioral task
behavioral1
Sample
4c662c236fd8f1cacd5d6768b8245dc7_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
4c662c236fd8f1cacd5d6768b8245dc7_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
4c662c236fd8f1cacd5d6768b8245dc7_JaffaCakes118
Size
84KB
MD5
4c662c236fd8f1cacd5d6768b8245dc7
SHA1
0938d8eaed659735fc41d50696ba2bf3732d183e
SHA256
4795824303b3240e768cd39d79af446bd359dba0090f3ec684736512739dd9bf
SHA512
bbfa43f54c888c2b2a5c3f7e06f38d16cd29e2c1c765f6ea3c35d4f5e7b9beb6d2fd3042a4545c0de9946fd809d0757b46c31b8391ca05b6f4bdd82cecd7d121
SSDEEP
1536:sk0+rqOImmN5FfL/TR32PV3BO/JrOZSTjPPS8zpEbG/ekeXgs+T2lt:sk0+mpHhR32PV3s/JSZAPHpEbQxzrT2r
Checks for missing Authenticode signature.
resource |
---|
4c662c236fd8f1cacd5d6768b8245dc7_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
FindFirstFileA
SetVolumeMountPointW
GetStdHandle
EnumResourceLanguagesA
CreateMailslotA
MapViewOfFileEx
FreeLibraryAndExitThread
IsValidCodePage
GetShortPathNameW
SetDefaultCommConfigW
GetCurrentDirectoryW
GetStartupInfoW
GetCurrentThread
Beep
SetEnvironmentVariableW
FindNextVolumeMountPointW
SetTimeZoneInformation
RemoveDirectoryW
GetFileAttributesW
GetThreadContext
DeleteFileA
GetStringTypeW
CreateWaitableTimerW
WriteConsoleA
lstrcatA
PeekNamedPipe
GlobalFree
HeapDestroy
WideCharToMultiByte
GetSystemDirectoryA
GetLocalTime
SetComputerNameA
RtlMoveMemory
GlobalFindAtomW
FlushViewOfFile
HeapSize
LocalUnlock
SetSystemTime
ExitProcess
SystemTimeToFileTime
CopyFileExW
WaitForMultipleObjectsEx
SetProcessWorkingSetSize
VirtualQueryEx
WriteConsoleW
FindAtomA
EnumUILanguagesW
CreateWaitableTimerA
UnlockFileEx
GetVolumePathNamesForVolumeNameW
CompareFileTime
UnlockFile
FindAtomW
GetSystemDefaultLangID
GetVersionExW
ReadConsoleInputW
GetCommandLineA
GetFileSizeEx
CreateConsoleScreenBuffer
SetConsoleTitleA
SetConsoleMode
SetLocalTime
IsBadHugeReadPtr
lstrcpynW
CreateJobObjectW
GetBinaryTypeW
HeapLock
OpenFileMappingA
GetComputerNameExW
GetLogicalDriveStringsA
CopyFileW
WriteFileEx
GetProfileStringW
CreateTimerQueue
DeleteTimerQueueEx
LoadResource
HeapUnlock
SetEvent
GlobalDeleteAtom
CreatePipe
GlobalGetAtomNameA
IsBadWritePtr
RegisterWaitForSingleObject
HeapAlloc
GetFileAttributesA
OpenThread
IsValidLocale
GetDateFormatA
EnumResourceNamesW
ConvertDefaultLocale
AssignProcessToJobObject
WriteFile
OpenEventW
HeapCreate
HeapWalk
ExpandEnvironmentStringsW
WaitNamedPipeW
Sleep
GetSystemWow64DirectoryW
GetSystemPowerStatus
MoveFileA
IsBadCodePtr
FindFirstChangeNotificationA
SetProcessShutdownParameters
RaiseException
FindFirstChangeNotificationW
ConnectNamedPipe
InterlockedIncrement
ExitThread
lstrcpynA
LockFile
GetHandleInformation
InterlockedDecrement
GetThreadPriority
OpenJobObjectW
GetModuleFileNameW
GlobalMemoryStatus
GetLastError
GetSystemTimeAsFileTime
VirtualProtect
GetComputerNameA
lstrcpyW
VirtualQuery
GetModuleHandleA
GetProcessHeap
MoveFileExA
CloseHandle
HeapValidate
LoadLibraryA
CreateMutexA
EnterCriticalSection
CreateThread
lstrlenA
CopyFileA
GetProcAddress
InterlockedExchange
lstrlenW
lstrcatW
GetVersion
CoGetCallContext
CoCreateInstance
OleRegGetUserType
CoEnableCallCancellation
CoGetMarshalSizeMax
CoGetInterfaceAndReleaseStream
CoFileTimeNow
GetRunningObjectTable
OleQueryLinkFromData
OleInitialize
OleIsRunning
StgIsStorageILockBytes
SetConvertStg
CoLockObjectExternal
CoSwitchCallContext
CreateBindCtx
OleRegGetMiscStatus
CreateILockBytesOnHGlobal
OleLockRunning
CoMarshalInterface
OleUninitialize
OleCreateStaticFromData
CoInitializeEx
StgCreateDocfileOnILockBytes
GetHGlobalFromILockBytes
PropVariantCopy
CoDisconnectObject
PropVariantClear
OleLoad
OleLoadFromStream
CoWaitForMultipleHandles
CoInitialize
CoTaskMemAlloc
CoTaskMemFree
GetPropA
GetForegroundWindow
GetWindowTextLengthA
InsertMenuA
PeekMessageW
ExitWindowsEx
OpenWindowStationW
EnableWindow
SetScrollPos
GetDialogBaseUnits
UnregisterClassW
ReleaseDC
GetMenu
CreateDialogParamA
InSendMessage
FindWindowExW
LoadMenuA
SwitchToThisWindow
CopyImage
CharToOemW
TranslateAcceleratorA
CharNextExA
DrawTextW
OpenDesktopW
CharToOemBuffA
SetWindowContextHelpId
GetFocus
SetWindowTextA
LoadBitmapW
MessageBoxW
CreateCaret
ReuseDDElParam
GetMessageExtraInfo
EndDialog
EnumChildWindows
GetWindowContextHelpId
GetShellWindow
GetSystemMetrics
GetCaretBlinkTime
DefMDIChildProcW
ChangeDisplaySettingsW
GetInputState
CopyAcceleratorTableA
GetNextDlgGroupItem
VkKeyScanA
SendDlgItemMessageW
GetAncestor
DialogBoxParamW
LoadIconA
OemToCharBuffA
OpenIcon
ValidateRect
InvalidateRect
CloseWindowStation
MapDialogRect
TrackPopupMenu
UnregisterHotKey
CharNextW
GetWindowTextLengthW
GetClassInfoExA
GetClassInfoExW
DestroyMenu
SetActiveWindow
CreatePopupMenu
EnumDesktopsW
DrawTextExA
SendMessageA
CharPrevA
MonitorFromWindow
DefDlgProcA
GetUpdateRgn
DestroyWindow
SetWindowTextW
ModifyMenuW
SetScrollInfo
WinHelpA
FindWindowA
GetWindowInfo
DeleteMenu
GetWindowDC
ReplyMessage
UnpackDDElParam
CreateIconIndirect
GrayStringA
ChildWindowFromPointEx
GetWindowRgn
MessageBeep
GetMenuCheckMarkDimensions
AttachThreadInput
InternalGetWindowText
DrawIcon
CharUpperA
EndDeferWindowPos
CheckDlgButton
InvalidateRgn
CheckMenuItem
RedrawWindow
BeginPaint
GetSystemMenu
GetQueueStatus
GetDlgItemInt
GetUserObjectInformationA
MessageBoxIndirectW
GetScrollPos
ModifyMenuA
PostQuitMessage
GetWindowRect
GetMenuItemInfoA
GetDC
SetCaretPos
LookupIconIdFromDirectory
CreateDialogParamW
AppendMenuA
KillTimer
DispatchMessageA
SetTimer
UnhookWindowsHookEx
SetWindowsHookExA
GetWindow
RegSetValueExA
GetUserNameA
RegQueryValueExA
RegDeleteValueA
RegOpenKeyExA
RegisterServiceCtrlHandlerW
OpenServiceW
GetServiceKeyNameW
QueryServiceLockStatusW
RegRestoreKeyA
ImpersonateSelf
EnumDependentServicesA
RegSetValueW
RegUnLoadKeyW
RegSaveKeyExW
SetTokenInformation
CloseServiceHandle
StartServiceW
EnumServicesStatusExW
CreateProcessWithLogonW
RegQueryInfoKeyA
ChangeServiceConfig2W
DuplicateTokenEx
RegCreateKeyExA
RegEnumKeyExA
StartServiceCtrlDispatcherA
SetThreadToken
CreateProcessAsUserA
GetUserNameW
RegisterServiceCtrlHandlerExA
RegSaveKeyA
RegConnectRegistryA
RegReplaceKeyW
ReadEventLogA
GetTokenInformation
ImpersonateAnonymousToken
RegOpenKeyW
MakeAbsoluteSD
QueryServiceLockStatusA
DeregisterEventSource
RegSetValueA
OpenSCManagerA
ImpersonateNamedPipeClient
EndPage
GetCharABCWidthsW
CombineRgn
SetTextJustification
SetWindowOrgEx
GetTextExtentPoint32W
CloseMetaFile
GetCharWidthA
EnumEnhMetaFile
CreateFontW
BitBlt
GetStockObject
GetKerningPairsA
UnrealizeObject
InvertRgn
GetCharABCWidthsA
SetAbortProc
CreateHatchBrush
GetBrushOrgEx
PlayEnhMetaFileRecord
CreateBitmap
GetBkMode
ExtTextOutW
SetBitmapDimensionEx
SetMagicColors
PtVisible
MoveToEx
GetTextExtentPointW
SetViewportExtEx
SetPixelV
FillPath
DeleteDC
Polyline
CreateFontIndirectW
EnumFontFamiliesExA
SetMetaFileBitsEx
GetGlyphOutlineW
CreateHalftonePalette
CreateBitmapIndirect
Chord
GetTextCharset
GetBitmapDimensionEx
CopyMetaFileW
CreateFontA
RectVisible
UpdateColors
GetTextExtentPointA
ExtCreatePen
CreateDIBPatternBrushPt
SetTextAlign
CreateDIBitmap
CreateDiscardableBitmap
CreateMetaFileA
EnumFontsA
SetStretchBltMode
SetROP2
GetCharWidthW
PlayMetaFile
GetNearestPaletteIndex
GetTextExtentExPointW
SelectObject
CopyEnhMetaFileA
GetTextExtentExPointA
GetCurrentPositionEx
FlattenPath
PolyPolyline
GetTextCharsetInfo
SetViewportOrgEx
IntersectClipRect
CreateEnhMetaFileA
SetColorAdjustment
CloseEnhMetaFile
GetMetaFileA
SetTextCharacterExtra
CreatePolygonRgn
GetTextExtentPoint32A
GetRandomRgn
PlayMetaFileRecord
DeleteObject
EnumFontFamiliesExW
TextOutA
LPtoDP
DllInit
DllInstall
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ