DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
63052f6d36e1559b1b51d0026eb1c25f_JaffaCakes118.dll
Resource
win7-20240708-en
Target
63052f6d36e1559b1b51d0026eb1c25f_JaffaCakes118
Size
336KB
MD5
63052f6d36e1559b1b51d0026eb1c25f
SHA1
7d3912de0336fdd4d0e967355a9877ff6ba978c4
SHA256
bd018d4323ae7345a25f23e0fa083828142355fb470b72d4b24d11481888e325
SHA512
f4ad8ab16bf1af45b6bba031d9b6a3f1ba37e1a61d9f046ea81eb02933e482fa3a4016cd233de2116fcc66f0609583f5ba15f18b91487f99f091896bb35a4b87
SSDEEP
6144:1iep128jvkDu0T8HOEb1ZrB0jakXJAvNSVjEz6/Zee7FckoLnBNF5HYA7GLDx2u:13u8jvkDu0T8HOEb10jakXJAvN2Ez6kN
Checks for missing Authenticode signature.
resource |
---|
63052f6d36e1559b1b51d0026eb1c25f_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetVersionExA
CloseHandle
CreateFileA
DeviceIoControl
lstrlenA
InitializeCriticalSection
LeaveCriticalSection
MultiByteToWideChar
lstrlenW
EnterCriticalSection
DeleteCriticalSection
GetSystemTime
CreateThread
GetTickCount
GetProcAddress
LoadLibraryA
FreeLibrary
GetUserDefaultLangID
GetVolumeInformationA
GetEnvironmentVariableA
lstrcmpiA
WideCharToMultiByte
IsBadReadPtr
IsBadCodePtr
Module32First
GetModuleHandleA
VirtualProtect
CreateToolhelp32Snapshot
ReleaseMutex
GetVersion
GetCurrentProcessId
FindResourceA
LoadResource
SizeofResource
IsDBCSLeadByte
RaiseException
DisableThreadLibraryCalls
GetModuleFileNameA
LoadLibraryExA
PulseEvent
TerminateThread
WaitForMultipleObjects
GetFullPathNameA
lstrcpynA
WriteFile
CreateDirectoryA
Sleep
GetTempFileNameA
MoveFileA
DeleteFileA
GetCurrentThreadId
LCMapStringW
LCMapStringA
GetOEMCP
LocalFree
InterlockedCompareExchange
CreateMutexA
CreateFileMappingA
ResetEvent
GetLastError
CreateEventA
SetEvent
WaitForSingleObject
InterlockedDecrement
InterlockedIncrement
UnmapViewOfFile
Module32Next
MapViewOfFile
SetEnvironmentVariableA
CompareStringW
CompareStringA
FlushFileBuffers
GetTimeZoneInformation
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
GetLocaleInfoW
GetStringTypeW
GetStringTypeA
GetCPInfo
HeapSize
SetLastError
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetStdHandle
ExitProcess
HeapCreate
HeapDestroy
VirtualFree
GetProcessHeap
GetCommandLineA
IsValidCodePage
IsValidLocale
EnumSystemLocalesA
GetUserDefaultLCID
GetDateFormatA
GetTimeFormatA
GetConsoleMode
GetConsoleCP
SetFilePointer
RtlUnwind
GetSystemTimeAsFileTime
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
InterlockedExchange
GetACP
GetLocaleInfoA
GetThreadLocale
HeapAlloc
HeapFree
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
VirtualAlloc
GetSystemInfo
VirtualQuery
HeapReAlloc
SetHandleCount
CharNextA
EnumThreadWindows
UnregisterClassA
GetClassNameA
IsWindow
RegQueryInfoKeyA
RegEnumKeyExA
RegDeleteKeyA
RegOpenKeyExA
RegCloseKey
RegCreateKeyExA
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
RegQueryValueExA
RegSetValueExA
RegDeleteValueA
SHGetSpecialFolderPathA
OleRun
CLSIDFromString
CLSIDFromProgID
CoUninitialize
CoCreateInstance
CoInitializeEx
CoTaskMemRealloc
CoTaskMemFree
CoTaskMemAlloc
SafeArrayDestroy
SafeArrayAccessData
SafeArrayCreateVector
LoadRegTypeLi
VarUI4FromStr
LoadTypeLi
VarBstrCat
VariantChangeType
SysAllocStringLen
VariantInit
VariantClear
SysStringLen
SysFreeString
GetErrorInfo
SysAllocString
SHDeleteKeyA
PathFileExistsA
PathGetDriveNumberA
SnmpUtilOidCpy
IsValidURL
InternetOpenA
InternetGetCookieExA
InternetGetConnectedState
InternetCanonicalizeUrlA
InternetOpenUrlA
InternetQueryDataAvailable
InternetReadFile
InternetCloseHandle
InternetSetOptionA
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ