DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
KeyAndSubKeyDeleteOne
KeyAndSubKeyDeleteTwo
_CFS
Static task
static1
Behavioral task
behavioral1
Sample
6f4191f65d4cb451dd68c57f38163b6e_JaffaCakes118.dll
Resource
win7-20240705-en
Target
6f4191f65d4cb451dd68c57f38163b6e_JaffaCakes118
Size
892KB
MD5
6f4191f65d4cb451dd68c57f38163b6e
SHA1
f28c3be05d5bed6c78a3a453eaf395222fd7a419
SHA256
82ce7f43b01454e9e6908930227df48aac8496ed2fe0ffb06a58bc3c0e93b148
SHA512
e5fd046182f68b5292fef6a50a9949794dd62b0334e138250000814226c6dfa0750c9a8b92931c7135633f9433979127ece392288171b04f6ce1850e6c89d136
SSDEEP
12288:w1HyrZb0YQU+jDm3Ub9uvcjToyU59nP3V7x:w1iy/q3ZxVP
Checks for missing Authenticode signature.
resource |
---|
6f4191f65d4cb451dd68c57f38163b6e_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PathFindFileNameA
PathFindExtensionA
PathStripToRootA
PathIsUNCA
UrlEscapeA
PathFileExistsA
StrToIntA
PlaySoundA
GetAdaptersInfo
InternetOpenUrlA
InternetOpenA
InternetCloseHandle
InternetReadFile
InternetQueryDataAvailable
CreateFileA
GetCurrentProcessId
LocalAlloc
TlsGetValue
GlobalReAlloc
GlobalHandle
TlsAlloc
TlsSetValue
LocalReAlloc
TlsFree
SetErrorMode
GlobalFlags
GetCPInfo
GetOEMCP
FileTimeToSystemTime
WritePrivateProfileStringA
FileTimeToLocalFileTime
GetFileAttributesA
GetFileTime
RtlUnwind
GetSystemTimeAsFileTime
HeapFree
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
HeapReAlloc
GetCommandLineA
GetProcessHeap
ExitProcess
HeapSize
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetACP
LCMapStringA
LCMapStringW
HeapDestroy
HeapCreate
VirtualFree
GetStdHandle
GetTimeZoneInformation
SetHandleCount
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetStringTypeA
GetStringTypeW
GetConsoleCP
GetConsoleMode
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetEnvironmentVariableA
GetFullPathNameA
GetVolumeInformationA
FindFirstFileA
FindClose
GetCurrentProcess
DuplicateHandle
GetThreadLocale
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
GetModuleFileNameW
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
lstrcmpA
FormatMessageA
MulDiv
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
SetLastError
lstrcmpW
GetProcAddress
LocalFree
CompareStringA
CompareStringW
GetVersion
InterlockedExchange
GlobalAlloc
GlobalLock
FreeResource
GlobalUnlock
GlobalFree
CreateThread
lstrcpyW
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
IsDBCSLeadByte
lstrcmpiA
LoadLibraryExA
RaiseException
GetModuleHandleA
InterlockedDecrement
InterlockedIncrement
InitializeCriticalSection
CreateProcessA
WaitForSingleObject
GetTickCount
GetVersionExA
DeleteFileA
CloseHandle
GetTempPathA
GetTempFileNameA
GetLastError
GetSystemDirectoryA
LoadLibraryA
FreeLibrary
lstrlenA
MultiByteToWideChar
lstrlenW
GetModuleFileNameA
LoadResource
LockResource
SizeofResource
FindResourceA
WideCharToMultiByte
Sleep
HeapAlloc
GetWindowThreadProcessId
UnregisterClassA
GetSysColorBrush
GetMessageA
TranslateMessage
ValidateRect
PostQuitMessage
GetWindowDC
ReleaseDC
GetDC
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
MoveWindow
SetWindowTextA
IsDialogMessageA
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
ModifyMenuA
GetMenuState
EnableMenuItem
CheckMenuItem
RegisterWindowMessageA
LoadIconA
SendDlgItemMessageA
WinHelpA
GetCapture
SetWindowsHookExA
CallNextHookEx
SetPropA
GetPropA
RemovePropA
SetFocus
GetWindowTextLengthA
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
MapWindowPoints
GetKeyState
SetForegroundWindow
IsWindowVisible
GetMenuItemID
GetMenuItemCount
MessageBoxA
GetClassInfoExA
GetDlgCtrlID
CallWindowProcA
SetWindowPos
SystemParametersInfoA
SetTimer
GetWindowRect
PostMessageA
GetMenu
KillTimer
EnableWindow
IsIconic
GetWindowPlacement
GetDesktopWindow
GetActiveWindow
SetActiveWindow
GetSystemMetrics
CreateDialogIndirectParamA
GetDlgItem
IsWindowEnabled
GetParent
GetNextDlgTabItem
EndDialog
GetCursorPos
PtInRect
GetClassLongA
SetClassLongA
AdjustWindowRectEx
CharUpperA
GetSysColor
RedrawWindow
UpdateWindow
InvalidateRect
SetCursor
LoadCursorA
CharNextA
DispatchMessageA
PeekMessageA
GetAsyncKeyState
IsWindow
CharUpperBuffA
ShowWindow
DestroyWindow
GetClientRect
GetWindow
GetFocus
SendMessageA
LoadBitmapA
DefWindowProcA
GetWindowLongA
GetClassNameA
EnumChildWindows
EnumWindows
LoadMenuA
GetSubMenu
TrackPopupMenu
DestroyMenu
GetClassInfoA
RegisterClassA
CreateWindowExA
CopyRect
BeginPaint
EndPaint
SetWindowLongA
DeleteDC
GetMapMode
SaveDC
GetDeviceCaps
CreateBitmap
SetBkColor
SetTextColor
GetClipBox
DeleteObject
CreateSolidBrush
GetStockObject
GetObjectA
CreateFontIndirectA
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetWindowExtEx
GetViewportExtEx
MoveToEx
LineTo
SetMapMode
SetBkMode
RestoreDC
GetFileTitleA
ClosePrinter
OpenPrinterA
DocumentPropertiesA
RegQueryInfoKeyA
RegEnumKeyExA
RegCreateKeyA
RegSetValueExA
RegCreateKeyExA
RegOpenKeyExA
RegCloseKey
RegOpenKeyA
RegEnumKeyA
RegQueryValueExA
RegDeleteKeyA
RegDeleteValueA
RegQueryValueA
ShellExecuteExA
ShellExecuteA
CoTaskMemAlloc
CLSIDFromString
StringFromCLSID
CoTaskMemFree
CoTaskMemRealloc
CreateStreamOnHGlobal
StringFromGUID2
CoCreateInstance
CoCreateGuid
SysFreeString
VarUI4FromStr
UnRegisterTypeLi
SysAllocString
LoadTypeLi
SysStringLen
VariantClear
VariantCopy
VariantInit
SysAllocStringByteLen
VarBstrCmp
VariantChangeType
OleLoadPicture
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
KeyAndSubKeyDeleteOne
KeyAndSubKeyDeleteTwo
_CFS
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ