Action
ActionEx
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
EventInvoke
Install
SCEventInvoke
SetSysInfo
Version
Static task
static1
Behavioral task
behavioral1
Sample
5e3ae42a1b148c3f1f939957c22bdd97_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
5e3ae42a1b148c3f1f939957c22bdd97_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
5e3ae42a1b148c3f1f939957c22bdd97_JaffaCakes118
Size
220KB
MD5
5e3ae42a1b148c3f1f939957c22bdd97
SHA1
f5c7b9109b710d45bc1d3f49a195b2e9fb2d5ecf
SHA256
592ad8f762a9456c35092f9ba8efb308f2720579f7aa5c2fd8c2d8aa8a284468
SHA512
595a81e214a0edc8ba765336ed56852b44956a10a0ef8d686ca02c6c57f05c25aaee11522896c714d3f2c4e72dcc01deb60212ec0b36fe2a9cced61e502861fc
SSDEEP
3072:HtpPHZQtckqwyznOKGEWnifIZYJQZkpR6hIkMtT/FgqdZQFmg5+2vQbe:Np2txyz/GHi6BZkpSMtRhwFTbvQbe
Checks for missing Authenticode signature.
resource |
---|
5e3ae42a1b148c3f1f939957c22bdd97_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
RemoveDirectoryA
FindClose
FindNextFileA
FindFirstFileA
ReleaseMutex
WriteFile
MoveFileExA
CopyFileA
GetCurrentProcess
InterlockedDecrement
CreateThread
SetEvent
WaitForMultipleObjects
ResetEvent
CreateEventA
GlobalAlloc
FreeResource
GlobalUnlock
GlobalLock
GetEnvironmentVariableA
ExitProcess
SetUnhandledExceptionFilter
WriteProcessMemory
VirtualProtect
LoadLibraryExA
SetErrorMode
GetVersion
CreateDirectoryA
LocalFree
SetLastError
GetACP
GetModuleHandleA
FindResourceA
LoadResource
SizeofResource
LockResource
WinExec
GetWindowsDirectoryA
GetSystemDirectoryA
SetFilePointer
ReadFile
GetShortPathNameA
CreateFileA
DeviceIoControl
GetVersionExA
lstrcpyA
lstrcatA
Sleep
lstrlenA
MultiByteToWideChar
GetPrivateProfileStringA
GetPrivateProfileIntA
WritePrivateProfileStringA
GetPrivateProfileSectionA
DeleteFileA
GetTempPathA
GetTempFileNameA
WaitForSingleObject
GetTickCount
CreateMutexA
GetLastError
CloseHandle
GetProcAddress
FreeLibrary
DisableThreadLibraryCalls
LoadLibraryA
GetCurrentThreadId
lstrlenW
WideCharToMultiByte
lstrcmpA
GetModuleFileNameA
MulDiv
EnumThreadWindows
GetClassNameA
RemovePropA
GetPropA
IsWindow
FindWindowExA
ExitWindowsEx
SendMessageTimeoutA
RegisterWindowMessageA
SetForegroundWindow
GetSystemMetrics
LoadImageA
wsprintfA
CreateWindowExA
PtInRect
SetWindowLongW
IsWindowUnicode
GetForegroundWindow
CallWindowProcA
CallWindowProcW
DestroyWindow
IsWindowVisible
GetParent
DialogBoxParamA
DrawIconEx
DefWindowProcA
CheckDlgButton
LoadMenuA
GetSubMenu
TrackPopupMenu
DestroyMenu
IsDlgButtonChecked
EndDialog
LoadIconA
SetDlgItemTextA
ClientToScreen
DrawIcon
GetAncestor
GetCapture
GetDC
GetMessagePos
GetSysColor
ReleaseDC
SetCapture
ReleaseCapture
InvalidateRect
LoadCursorA
SetCursor
BeginPaint
DrawTextA
EndPaint
GetWindowTextA
FlashWindowEx
GetClientRect
PeekMessageA
PostQuitMessage
SetWindowLongA
IsIconic
SetWindowTextA
EnableWindow
SendMessageA
SetPropA
SetTimer
KillTimer
CreateDialogParamA
GetDlgItem
GetWindowRect
ScreenToClient
ShowWindow
GetMessageA
IsDialogMessageA
TranslateAcceleratorA
TranslateMessage
DispatchMessageA
DestroyIcon
LoadBitmapA
LoadStringA
GetDesktopWindow
MessageBoxA
PostMessageA
SetWindowPos
DeleteObject
SetBkColor
SetTextColor
SelectObject
GetPixel
CreateFontIndirectA
GetObjectA
SetBkMode
Rectangle
CreateSolidBrush
CreatePen
DeleteDC
CreateBitmap
BitBlt
CreateCompatibleBitmap
CreateCompatibleDC
CreateDIBitmap
GetDeviceCaps
RegSetValueExA
RegOpenKeyExA
RegQueryValueExA
RegCreateKeyExA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegCloseKey
RegOpenKeyA
RegEnumKeyA
RegDeleteKeyA
RegEnumValueA
ShellExecuteA
StringFromIID
CLSIDFromString
CreateStreamOnHGlobal
OleUninitialize
OleInitialize
StringFromCLSID
CoTaskMemFree
CoGetMalloc
CoUninitialize
CoInitialize
CoCreateInstance
SysAllocStringByteLen
RegisterTypeLi
LoadTypeLi
SysFreeString
VariantClear
VariantInit
OleLoadPicture
SysAllocString
SysStringByteLen
ImageList_Create
ImageList_Destroy
ImageList_AddMasked
SHSetValueA
SHRegCloseUSKey
SHDeleteKeyA
StrCpyNW
SHRegEnumUSKeyA
SHRegOpenUSKeyA
SHDeleteValueA
SHDeleteEmptyKeyA
SHGetValueA
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
URLDownloadToFileA
free
fopen
fread
fclose
malloc
strstr
_beginthreadex
strncpy
_except_handler3
memcpy
_mbsicmp
strcpy
strcat
memcmp
??2@YAPAXI@Z
strrchr
strlen
wcslen
_wcsnicmp
_snprintf
_wcsicmp
strcmp
memset
__CxxFrameHandler
_mbsnbcpy
rand
srand
time
sscanf
strchr
sprintf
_mbsstr
_ftol
strftime
localtime
atol
strncmp
ftell
fseek
_mbsrchr
memmove
_mbschr
memchr
fwrite
fprintf
_ltoa
_strnicmp
fgets
rewind
_stricmp
atoi
_mbscmp
_mbsnbcmp
wcscmp
wcscpy
tolower
toupper
_CxxThrowException
__dllonexit
_onexit
_initterm
_adjust_fdiv
??1type_info@@UAE@XZ
_itoa
strncat
SetupIterateCabinetA
InternetOpenA
InternetConnectA
HttpOpenRequestA
HttpSendRequestA
InternetReadFile
InternetCloseHandle
InternetSetStatusCallback
InternetGetConnectedState
InternetCrackUrlA
HttpQueryInfoA
Action
ActionEx
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
EventInvoke
Install
SCEventInvoke
SetSysInfo
Version
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ