DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
4de140b979ce9445dcd376d2aee55c4e_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
4de140b979ce9445dcd376d2aee55c4e_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
4de140b979ce9445dcd376d2aee55c4e_JaffaCakes118
Size
196KB
MD5
4de140b979ce9445dcd376d2aee55c4e
SHA1
3d7e31c548deafc53d3c17eaca9fb68770031068
SHA256
7de47d78d0ef9b0eb85dba9b0f29666129a5376efadd6fa8c063b2ba3dd94d1b
SHA512
0edf2d3646596f1cde4e62b6971dae285610fe0faea4533c80c8497cd909b0d038dfd588eb442a587154189e63b7ce6e2f60bbc181fbad6b0f5cedb0eae4e295
SSDEEP
3072:HUS9da0jlheXEIUUR9yiJrUCWc9z30LURsKt4Aqxedu9:0S9/pheXnNOoz30LLAqQdu
Checks for missing Authenticode signature.
resource |
---|
4de140b979ce9445dcd376d2aee55c4e_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
ImageList_SetBkColor
ImageList_ReplaceIcon
ImageList_Create
ImageList_Destroy
GetLastError
RaiseException
FreeLibrary
MultiByteToWideChar
SizeofResource
LoadResource
FindResourceW
LoadLibraryExW
lstrcmpiW
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
GetCurrentThreadId
FlushInstructionCache
GetModuleHandleW
SetLastError
FlushFileBuffers
CloseHandle
CreateFileA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
GetConsoleMode
GetConsoleCP
SetFilePointer
lstrlenW
InterlockedIncrement
InitializeCriticalSection
DisableThreadLibraryCalls
GetModuleFileNameW
InterlockedDecrement
LoadLibraryW
GetProcAddress
GetCurrentProcess
GetStringTypeW
GetStringTypeA
VirtualQuery
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
InterlockedCompareExchange
HeapFree
GetProcessHeap
HeapAlloc
LoadLibraryA
IsProcessorFeaturePresent
VirtualFree
VirtualAlloc
GetVersionExA
InterlockedExchange
GetACP
GetLocaleInfoA
GetThreadLocale
LocalFree
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RtlUnwind
HeapReAlloc
GetCommandLineA
GetModuleHandleA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
DebugBreak
WideCharToMultiByte
GetCPInfo
GetOEMCP
LCMapStringA
LCMapStringW
WriteFile
GetStdHandle
GetModuleFileNameA
HeapDestroy
HeapCreate
ExitProcess
Sleep
HeapSize
SetHandleCount
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
SetWindowLongW
ShowWindow
GetClassInfoExW
UnregisterClassA
RegisterClassExW
CreateWindowExW
GetClientRect
CharNextW
CallWindowProcW
GetWindowLongW
LoadCursorW
GetSysColor
SendMessageW
IsWindow
DestroyWindow
DefWindowProcW
RegCreateKeyExW
RegDeleteValueW
RegDeleteKeyW
RegCloseKey
RegQueryInfoKeyW
RegEnumKeyExW
RegOpenKeyExW
RegSetValueExW
CoTaskMemRealloc
StringFromGUID2
CoCreateInstance
CoTaskMemFree
CoTaskMemAlloc
LoadRegTypeLi
UnRegisterTypeLi
LoadTypeLi
SysStringLen
RegisterTypeLi
VarUI4FromStr
SysFreeString
SysAllocString
VariantInit
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ