DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
5ef42211b9385c242d36c0d979545ba7_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
5ef42211b9385c242d36c0d979545ba7_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
5ef42211b9385c242d36c0d979545ba7_JaffaCakes118
Size
224KB
MD5
5ef42211b9385c242d36c0d979545ba7
SHA1
9125b39910c97afbe99c1aa5af639a6d74159dd2
SHA256
f9deb81191c87acf1c03946fdc86ad4f8f27ebddcd6115ac454bad0dff86c6fc
SHA512
e0291ca9fcd4e693ada3c69b33874b2f4895347b5388909de7dd9d8c614d36b5777f556f563c32f26ac1be458ebeb3393e8660d89d407e54a4bf90ac2a288ed3
SSDEEP
6144:tVX6yF2HhRmYH3Uq7iYm+tuCO3/GR5uuX:jKCWh4ckJX+Fgx
Checks for missing Authenticode signature.
resource |
---|
5ef42211b9385c242d36c0d979545ba7_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
UrlMkSetSessionOption
IsValidURL
InitializeCriticalSection
DeleteCriticalSection
LeaveCriticalSection
InterlockedIncrement
EnterCriticalSection
InterlockedDecrement
MultiByteToWideChar
GetModuleFileNameA
GetLastError
WideCharToMultiByte
lstrlenW
SizeofResource
LoadResource
FindResourceA
LoadLibraryExA
lstrcmpiA
lstrcpynA
IsDBCSLeadByte
GetModuleHandleA
lstrcatA
lstrcmpiW
GetLocalTime
ExitProcess
lstrcatW
lstrcpyW
GetVolumeInformationA
CreateProcessA
CloseHandle
TerminateThread
WaitForSingleObject
CreateThread
SetFileTime
WriteFile
GetFileTime
CreateFileA
Process32Next
Module32First
GetTickCount
FlushFileBuffers
SetStdHandle
GetThreadLocale
GetSystemInfo
VirtualProtect
LCMapStringW
LCMapStringA
SetFilePointer
GetStringTypeW
GetStringTypeA
GetCPInfo
GetOEMCP
IsBadCodePtr
IsBadReadPtr
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
SetUnhandledExceptionFilter
GetLocaleInfoA
GetACP
GetVersionExA
InterlockedExchange
Sleep
LoadLibraryA
QueryPerformanceCounter
GetProcAddress
FreeLibrary
lstrlenA
lstrcpyA
DisableThreadLibraryCalls
GetCurrentProcessId
IsBadWritePtr
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
TlsAlloc
TlsGetValue
SetLastError
GetCommandLineA
TlsSetValue
GetCurrentThreadId
GetSystemTimeAsFileTime
HeapAlloc
HeapReAlloc
RaiseException
HeapFree
RtlUnwind
LocalFree
TerminateProcess
VirtualQuery
HeapSize
TlsFree
GetCurrentProcess
CharNextA
SetTimer
LoadStringA
SetCaretBlinkTime
UpdateWindow
IsDlgButtonChecked
GetParent
GetFocus
GetMenuCheckMarkDimensions
wsprintfA
GetKeyboardType
IsWindow
GetMenuItemCount
GetMenu
GetDoubleClickTime
GetKeyboardLayout
GetScrollPos
GetInputState
InSendMessage
GetDC
CloseWindow
EndDialog
EnumWindows
KillTimer
CreateDialogParamA
IsWindowVisible
CallMsgFilterA
wsprintfW
IsZoomed
DestroyMenu
RegCreateKeyA
RegSetValueExA
RegOpenKeyA
RegQueryInfoKeyA
RegEnumKeyExA
RegCreateKeyExA
RegDeleteValueA
RegEnumKeyA
RegOpenKeyExA
RegCloseKey
RegDeleteKeyA
RegQueryValueExA
SHGetSpecialFolderPathA
ShellExecuteA
CoCreateInstance
CoTaskMemFree
CoTaskMemAlloc
CoTaskMemRealloc
StringFromCLSID
StringFromGUID2
SafeArrayGetLBound
SafeArrayGetUBound
SafeArrayUnaccessData
SysStringLen
LoadRegTypeLi
UnRegisterTypeLi
LoadTypeLi
SysAllocString
RegisterTypeLi
SysFreeString
VarUI4FromStr
VariantInit
DispCallFunc
VariantClear
SafeArrayAccessData
PathFindExtensionA
InitCommonControlsEx
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ