DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
72dc755db3ce78e8636f3dd19fb600ec_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
72dc755db3ce78e8636f3dd19fb600ec_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
72dc755db3ce78e8636f3dd19fb600ec_JaffaCakes118
Size
120KB
MD5
72dc755db3ce78e8636f3dd19fb600ec
SHA1
9f865d71a5e66e99caa5adec40a2f165dbd84340
SHA256
9209cf18d0e128f0c5d099e597cfcea3a4768d98ffca9f7958de3df58b7ea164
SHA512
c08abf632401b7666bf71a59359cb9a3eb67e0320a94800b52715b49cef7c77d3990aea6a5e58030061dc87ca1ef8f373900db2001163e92140a1fdb5a07cd42
SSDEEP
3072:WCMFL3JEwlAwUj2mYkGBEBIpFy3E6f1uXmr71:kOwlGWgaF2X1
Checks for missing Authenticode signature.
resource |
---|
72dc755db3ce78e8636f3dd19fb600ec_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
DeleteFileA
CreateProcessA
InterlockedExchange
CreateFileMappingA
GetProcAddress
GetModuleHandleA
LocalFree
InterlockedIncrement
GetSystemTimeAsFileTime
LoadLibraryA
CloseHandle
CreateFileA
GlobalAlloc
MoveFileA
ReleaseMutex
CopyFileA
GetCurrentProcessId
EnterCriticalSection
InterlockedDecrement
GetProcessHeap
UnmapViewOfFile
VirtualQuery
VirtualProtect
CreateMutexA
InitializeCriticalSection
WriteFile
WaitForSingleObject
HeapFree
FindFirstFileA
Beep
GetEnvironmentVariableW
CompareStringA
FindFirstChangeNotificationA
CreateConsoleScreenBuffer
UnlockFileEx
GetSystemTime
WideCharToMultiByte
GetSystemDirectoryW
OpenEventA
UnlockFile
IsBadStringPtrA
FileTimeToSystemTime
GetNumberFormatW
GetSystemTimeAdjustment
ExitThread
ReadProcessMemory
lstrlenA
GetLocaleInfoW
TerminateJobObject
SetConsoleTextAttribute
IsWow64Process
CreateIoCompletionPort
RegisterWaitForSingleObject
CreateSemaphoreA
HeapWalk
GetEnvironmentStrings
FindResourceExW
PeekConsoleInputW
DosDateTimeToFileTime
FreeConsole
FindFirstFileExW
LocalSize
GetUserDefaultUILanguage
GlobalAddAtomW
RemoveDirectoryW
SetDefaultCommConfigW
LCMapStringA
ClearCommError
IsValidLanguageGroup
CreateMailslotA
GetDateFormatA
GetBinaryTypeA
FindVolumeClose
OpenMutexA
FlushConsoleInputBuffer
SetVolumeLabelW
VerifyVersionInfoA
GetUserDefaultLangID
GetModuleHandleExW
GetProfileIntW
ReadConsoleW
GetExitCodeProcess
ResumeThread
FindNextVolumeMountPointW
GetStringTypeExA
UnregisterWaitEx
FindResourceA
HeapUnlock
HeapDestroy
FormatMessageW
SetConsoleScreenBufferSize
GetSystemInfo
GetHandleInformation
lstrcatW
CreateWaitableTimerA
BindIoCompletionCallback
GetTapeParameters
GetCurrentDirectoryW
AddAtomA
SetComputerNameA
GetFileAttributesW
GlobalFlags
VirtualAlloc
ReadFileEx
GetFileTime
FindResourceW
WaitForMultipleObjects
GetConsoleMode
GetVersion
GetFileAttributesExA
FindCloseChangeNotification
VerLanguageNameW
HeapReAlloc
GetModuleFileNameW
GetShortPathNameA
GlobalFindAtomW
CancelWaitableTimer
GetDateFormatW
GetWindowsDirectoryA
FindFirstVolumeMountPointW
DisconnectNamedPipe
lstrcpyA
GetLogicalDriveStringsW
OpenFile
DeviceIoControl
GetEnvironmentStringsW
EnumUILanguagesW
GlobalHandle
MoveFileExW
GetStartupInfoA
GetLongPathNameW
WaitNamedPipeW
SuspendThread
ConvertDefaultLocale
InterlockedCompareExchange
GetComputerNameW
GetStringTypeW
CoInitialize
CoTaskMemAlloc
OleCreate
CoTaskMemFree
CoCreateInstanceEx
CoCreateGuid
CoUnmarshalInterface
CoFreeUnusedLibraries
MkParseDisplayName
StgIsStorageFile
CoInitializeEx
CreateItemMoniker
OleIsRunning
CoAllowSetForegroundWindow
CoSwitchCallContext
CoDisconnectObject
CoRegisterMessageFilter
OleCreateLink
OleLoadFromStream
OleLockRunning
CoEnableCallCancellation
CoQueryProxyBlanket
PropVariantClear
OleTranslateAccelerator
GetHGlobalFromILockBytes
CoCreateFreeThreadedMarshaler
StgOpenStorage
OleInitialize
CreateBindCtx
StringFromGUID2
OleCreateLinkToFile
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ