DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
GetClientTicket
Static task
static1
Behavioral task
behavioral1
Sample
6031ea55de61401730b308558e20f6d9_JaffaCakes118.dll
Resource
win7-20240708-en
Target
6031ea55de61401730b308558e20f6d9_JaffaCakes118
Size
142KB
MD5
6031ea55de61401730b308558e20f6d9
SHA1
e48fd706399c638a704ae0d2848b8201dd6eedfb
SHA256
61c0aa1ffeadac44e6c5a203cf3f4b80c4ff40b01b5bd8206eb0f4da0ea32a42
SHA512
08aa8652d30e785c42d12cff5f80e6195c40113c4cf14b71af712a54a9e586afd44a3fe8c1a600475ded41a1cac1ef1bd60df87f8237cee8182b79147be49628
SSDEEP
1536:3A2D7/ZT3/Nlq9ireDmy2U4exSVhqZ2dCcN2Zy1+SYN6dB5m7mZCJjUa:N7B32Vk7hm28jyxYN6dB53IJ5
Checks for missing Authenticode signature.
resource |
---|
6031ea55de61401730b308558e20f6d9_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
HttpSendRequestA
HttpQueryInfoA
InternetReadFile
InternetCloseHandle
InternetCrackUrlA
InternetSetCookieA
InternetGetConnectedState
InternetOpenA
InternetConnectA
HttpOpenRequestA
StrStrIA
PathFileExistsA
wnsprintfA
GetModuleHandleA
InterlockedIncrement
InterlockedDecrement
MultiByteToWideChar
WideCharToMultiByte
EnterCriticalSection
LeaveCriticalSection
GetLastError
GetProcAddress
lstrlenA
lstrlenW
GetModuleHandleW
SetThreadLocale
GetThreadLocale
lstrcmpiA
IsDBCSLeadByte
FreeLibrary
SizeofResource
LoadResource
FindResourceA
LoadLibraryExA
HeapReAlloc
HeapAlloc
TerminateThread
GetModuleFileNameA
GetProcessHeap
CloseHandle
LocalFree
LoadLibraryA
GetCurrentProcess
CreateProcessA
WriteFile
CreateFileA
GetTempPathA
lstrcmpA
SleepEx
ReleaseMutex
WaitForSingleObject
CreateMutexA
Sleep
CreateThread
GetVolumeInformationA
GetComputerNameA
GetSystemTimeAsFileTime
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
InitializeCriticalSection
RaiseException
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
HeapFree
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
SetHandleCount
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
GetStdHandle
HeapDestroy
HeapCreate
VirtualFree
ExitProcess
RtlUnwind
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
GetCurrentThreadId
GetCommandLineA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapSize
CharNextA
CharNextW
RegCreateKeyA
RegOpenKeyA
LookupAccountNameA
ConvertSidToStringSidA
RegQueryValueExA
OpenProcessToken
DuplicateTokenEx
ConvertStringSidToSidW
GetLengthSid
SetTokenInformation
RegEnumKeyExA
RegSetValueExA
RegCreateKeyExA
RegDeleteValueA
RegQueryInfoKeyA
RegOpenKeyExA
RegCloseKey
RegDeleteKeyA
CoTaskMemAlloc
CoTaskMemRealloc
CoTaskMemFree
CoCreateInstance
StringFromGUID2
LoadRegTypeLi
VarUI4FromStr
SysAllocStringLen
VariantClear
VariantInit
RegisterTypeLi
UnRegisterTypeLi
LoadTypeLi
SysAllocString
SysStringLen
SysFreeString
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
GetClientTicket
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ