DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
5e20b06bef4ecfc32039b1692e0f122b_JaffaCakes118.dll
Resource
win7-20240704-en
Target
5e20b06bef4ecfc32039b1692e0f122b_JaffaCakes118
Size
132KB
MD5
5e20b06bef4ecfc32039b1692e0f122b
SHA1
d5f64fa56c01589e96f1e9eae55792c2fe2344f5
SHA256
f2ee9b8eac7ba41ba06bede4011440d6af73011a87edf2833e0fc0cdf008d372
SHA512
8a18e30f1ab1bf16151a6c445dfa386764b2991a0dc579a8593c85b14ea369f9abedb9a328661813ece2c21d9dcdc62bcb32f6181eee05d6623558018463e135
SSDEEP
1536:hRhff9YnNHdDHVMnBPlVIRINxf6MPBix1M1yOEyxTxsplziGwvj2kR34KblpI9kE:LhX9YnVJQBd7Jy1c4Jbnk94Kblu6E
Checks for missing Authenticode signature.
resource |
---|
5e20b06bef4ecfc32039b1692e0f122b_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetShortPathNameA
WideCharToMultiByte
FreeLibrary
SizeofResource
LoadResource
FindResourceA
GetLastError
LoadLibraryExA
lstrcmpiA
lstrcpynA
IsDBCSLeadByte
HeapDestroy
GetProcAddress
LoadLibraryA
lstrcpyA
lstrcatA
GetCurrentThreadId
GetCurrentProcessId
IsBadWritePtr
IsBadReadPtr
TerminateThread
CloseHandle
GetLocalTime
SetFileAttributesA
CopyFileA
DeleteFileA
WriteFile
CreateFileA
MoveFileA
GetVersion
GetPrivateProfileStringA
WritePrivateProfileStringA
GetWindowsDirectoryA
CreateDirectoryA
GetFileAttributesA
GetSystemDirectoryA
FindClose
FindFirstFileA
WaitForSingleObject
lstrlenA
TerminateProcess
SystemTimeToFileTime
FileTimeToSystemTime
GetPrivateProfileSectionNamesA
GetPrivateProfileIntA
CompareStringW
CompareStringA
FlushFileBuffers
SetStdHandle
SetFilePointer
IsBadCodePtr
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
GetCurrentDirectoryA
GetFullPathNameA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
HeapSize
DisableThreadLibraryCalls
MultiByteToWideChar
lstrlenW
InterlockedDecrement
EnterCriticalSection
InterlockedIncrement
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
GetModuleFileNameA
GetCurrentProcess
GetOEMCP
GetACP
GetCPInfo
VirtualAlloc
ExitProcess
VirtualFree
HeapCreate
TlsGetValue
SetLastError
TlsFree
TlsAlloc
GetCommandLineA
GetDriveTypeA
FileTimeToLocalFileTime
ExitThread
TlsSetValue
CreateThread
RaiseException
GetSystemTime
GetTimeZoneInformation
HeapReAlloc
HeapAlloc
HeapFree
RtlUnwind
SetEnvironmentVariableA
SetWindowsHookExA
CharNextA
GetWindowTextA
MessageBoxA
SetWindowTextA
GetClassNameA
CallNextHookEx
UnhookWindowsHookEx
SetFocus
GetParent
FindWindowExA
LoadStringA
GetFocus
RegDeleteKeyA
RegQueryValueExA
RegEnumValueA
RegQueryInfoKeyA
RegSetValueExA
RegEnumKeyExA
RegOpenKeyExA
RegCloseKey
RegDeleteValueA
RegCreateKeyExA
ShellExecuteA
ShellExecuteExA
CoCreateInstance
CoTaskMemRealloc
CoTaskMemAlloc
CoTaskMemFree
VarUI4FromStr
SysFreeString
SysAllocString
LoadTypeLi
RegisterTypeLi
LoadRegTypeLi
VariantCopy
VariantChangeType
VariantClear
SysAllocStringLen
SysStringLen
InternetCloseHandle
InternetOpenUrlA
InternetQueryDataAvailable
InternetReadFile
InternetOpenA
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ