DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
GetVer
Install
Static task
static1
Behavioral task
behavioral1
Sample
70b433bee0702f10f933ea2bb8251ad6_JaffaCakes118.dll
Resource
win7-20240708-en
Target
70b433bee0702f10f933ea2bb8251ad6_JaffaCakes118
Size
64KB
MD5
70b433bee0702f10f933ea2bb8251ad6
SHA1
57258b66f604957e617553902c81930d1a962312
SHA256
d7d26b83e8dbe15ca60ba9320a2628e447e2d4b15882e390428cbe80a003b66c
SHA512
eddaa6fa4c76b40deb6a69b9cd0d75c14c96a1e38b4f72f0936db315187c3e791feda8945b12a7fdaea163f7cce71e9aa059d520ce82b238eef61e4a9480e6bf
SSDEEP
768:i6qiOKms8ZjQGJTIxq3nZN9nuWJbeBCj4I6xLWHeNhFCmQF9sQmJ969mH:VOVs8ZjpoqXgWfN6xHNem0jmPww
Checks for missing Authenticode signature.
resource |
---|
70b433bee0702f10f933ea2bb8251ad6_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
InterlockedIncrement
EnterCriticalSection
InterlockedDecrement
lstrlenW
GetShortPathNameW
GetModuleHandleW
GetModuleFileNameW
MultiByteToWideChar
SizeofResource
LoadResource
FindResourceW
LeaveCriticalSection
LoadLibraryExW
lstrcmpiW
lstrcpynW
HeapDestroy
lstrcpyW
lstrcatW
DeleteFileA
WinExec
GetBinaryTypeA
GetTickCount
GetTempPathA
DeleteCriticalSection
InitializeCriticalSection
GetLocalTime
DisableThreadLibraryCalls
GetCurrentThreadId
lstrlenA
LoadLibraryW
GetProcAddress
WideCharToMultiByte
FreeLibrary
GetModuleHandleA
GetModuleFileNameA
CreateThread
Sleep
GetCurrentProcess
GetLastError
CloseHandle
SetWindowsHookExW
CallNextHookEx
FindWindowA
CharNextW
GetMessageW
PostThreadMessageW
SetForegroundWindow
UnhookWindowsHookEx
FindWindowExA
SendMessageW
FindWindowExW
GetClassNameA
SendMessageA
PostMessageW
CharLowerA
LookupPrivilegeValueW
OpenProcessToken
RegCloseKey
RegSetValueExA
RegCreateKeyA
RegQueryValueExW
RegOpenKeyExA
RegDeleteKeyW
RegCreateKeyExW
RegDeleteValueW
RegOpenKeyExW
RegEnumKeyExW
RegSetValueExW
RegQueryInfoKeyW
RegEnumValueW
AdjustTokenPrivileges
ShellExecuteA
CoTaskMemRealloc
CoTaskMemAlloc
CoCreateInstance
CoInitialize
CoTaskMemFree
LoadRegTypeLi
SysStringLen
LoadTypeLi
SysAllocString
VarUI4FromStr
VariantInit
VariantClear
SysFreeString
RegisterTypeLi
GetRoleTextA
AccessibleObjectFromWindow
WindowFromAccessibleObject
GetStateTextA
free
realloc
memcmp
strchr
strncmp
fclose
fwrite
rename
_access
wcslen
wcscmp
_initterm
_adjust_fdiv
_stricmp
malloc
calloc
??2@YAPAXI@Z
??3@YAXPAX@Z
_purecall
atoi
strcat
swprintf
getchar
wprintf
strcmp
_splitpath
fopen
fgets
strstr
strcpy
memcpy
sprintf
strlen
memset
connect
htons
closesocket
socket
recv
gethostbyname
WSAStartup
inet_addr
send
Netbios
InternetOpenA
InternetReadFile
InternetOpenUrlA
InternetCloseHandle
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
GetVer
Install
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ