DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
4d53c412ceceaf6ce0b4d236bb86f4d1_JaffaCakes118.dll
Resource
win7-20240708-en
Target
4d53c412ceceaf6ce0b4d236bb86f4d1_JaffaCakes118
Size
176KB
MD5
4d53c412ceceaf6ce0b4d236bb86f4d1
SHA1
4e07f332d5ea8f7dbb6658aca9d25a67b4ba2e27
SHA256
159413a0db0013b74441090e5e7b5d144f6a7fbc7de2bb471c262fe16d864916
SHA512
9049ffc287c3ff1fe7a203d710b3884650f74384ccd25d5c5493baf4525e31e32ef4439fb7a655777228e08f8f8a8874936f16889d75a77d32d9dc2a3f7def19
SSDEEP
3072:FH8j0I+C4njQsexwr+bUXhyCryrhB1qYMOTpDjlqeeHqe:tWEjQchVrmzZErq
Checks for missing Authenticode signature.
resource |
---|
4d53c412ceceaf6ce0b4d236bb86f4d1_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
lstrlenA
CompareStringA
CompareStringW
DeleteFileA
CloseHandle
ReadFile
GetFileSize
CreateFileA
CreateProcessA
LocalFree
FormatMessageA
MoveFileA
GetSystemDirectoryA
HeapFree
GetProcessHeap
SetLastError
GlobalUnlock
GlobalLock
GlobalAlloc
EnterCriticalSection
LeaveCriticalSection
MulDiv
HeapAlloc
FlushInstructionCache
GetCurrentProcess
lstrcmpA
GetModuleFileNameA
GetCurrentThreadId
InterlockedIncrement
InterlockedDecrement
lstrcpynA
lstrcpyA
lstrcatA
IsDBCSLeadByte
FreeLibrary
LoadLibraryExA
GetModuleHandleA
DisableThreadLibraryCalls
CreateThread
GetLastError
RaiseException
SetEnvironmentVariableA
WideCharToMultiByte
LoadLibraryA
SetFilePointer
IsBadCodePtr
IsBadReadPtr
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
WriteFile
UnhandledExceptionFilter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
LCMapStringW
LCMapStringA
GetTimeZoneInformation
GetStringTypeW
GetStringTypeA
TlsGetValue
TlsSetValue
TlsFree
TlsAlloc
GetCPInfo
GetOEMCP
SetUnhandledExceptionFilter
TerminateProcess
GetProcAddress
IsBadWritePtr
VirtualFree
HeapCreate
ExitProcess
GetCommandLineA
GetSystemTimeAsFileTime
RtlUnwind
VirtualQuery
GetSystemInfo
VirtualAlloc
VirtualProtect
HeapSize
MultiByteToWideChar
HeapReAlloc
HeapDestroy
lstrcmpiA
lstrlenW
FindResourceExA
FindResourceA
LoadResource
LockResource
SizeofResource
DeleteCriticalSection
SetStdHandle
InitializeCriticalSection
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
FlushFileBuffers
InterlockedExchange
UnregisterClassA
EndDialog
MoveWindow
IsDlgButtonChecked
GetDlgItem
SetRect
DestroyWindow
CheckDlgButton
IsChild
SetWindowLongA
GetWindowTextA
GetWindowTextLengthA
SetWindowPos
SetWindowContextHelpId
MapDialogRect
GetWindow
CreateWindowExA
EnumThreadWindows
SystemParametersInfoA
CopyRect
wsprintfA
CreateAcceleratorTableA
CharNextA
GetParent
GetClassNameA
RedrawWindow
IsWindow
SendMessageA
GetFocus
EnumChildWindows
SetFocus
BeginPaint
EndPaint
GetSysColor
CallWindowProcA
GetDesktopWindow
InvalidateRgn
InvalidateRect
ReleaseDC
GetDC
GetClientRect
FillRect
SetCapture
ReleaseCapture
DestroyAcceleratorTable
GetWindowLongA
SetWindowTextA
DefWindowProcA
RegisterWindowMessageA
GetClassInfoExA
LoadCursorA
RegisterClassExA
GetStockObject
GetObjectA
GetDeviceCaps
BitBlt
CreateCompatibleDC
CreateCompatibleBitmap
DeleteDC
SelectObject
DeleteObject
CreateSolidBrush
RegCreateKeyExA
RegCloseKey
RegDeleteValueA
RegDeleteKeyA
RegSetValueExA
RegOpenKeyExA
RegQueryInfoKeyA
RegEnumKeyExA
CoTaskMemRealloc
CoTaskMemFree
CreateStreamOnHGlobal
OleInitialize
OleUninitialize
StringFromGUID2
CoTaskMemAlloc
OleLockRunning
CoGetClassObject
CLSIDFromProgID
CLSIDFromString
CoCreateInstance
SysAllocStringByteLen
VariantChangeType
VarUI4FromStr
RegisterTypeLi
UnRegisterTypeLi
LoadTypeLi
LoadRegTypeLi
VariantInit
VariantClear
OleCreateFontIndirect
SysStringByteLen
SysStringLen
SysFreeString
SysAllocString
SysAllocStringLen
SHSetValueA
SHGetValueA
SHDeleteKeyA
PathFindExtensionA
URLDownloadToFileA
InternetOpenA
InternetOpenUrlA
InternetReadFile
InternetCloseHandle
GetUrlCacheEntryInfoA
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ