DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
7344630f9dfc0f7c2b5af2fda2fdeb52_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
7344630f9dfc0f7c2b5af2fda2fdeb52_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
7344630f9dfc0f7c2b5af2fda2fdeb52_JaffaCakes118
Size
228KB
MD5
7344630f9dfc0f7c2b5af2fda2fdeb52
SHA1
0e2572862293b8efecfff158365b0c2d38ae61e9
SHA256
0808795add63f00aeba73ad1536e9b6b08afbaa694ae38c236d81f8e5d3af2e4
SHA512
34d96fdfd06a7aee3ebd47d854d633c6d73e19cc29ab7cb46a7a7b20607b3502e82e3ac3ec78cee18b005ad5b4c01b453adef8d79ac1c09fa66ce54ec34367d7
SSDEEP
6144:9AqcdXRNz27DvZwMpwcEIjLVpfgRgu+j2:9Az5RNzeoqFu6
Checks for missing Authenticode signature.
resource |
---|
7344630f9dfc0f7c2b5af2fda2fdeb52_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
UrlMkSetSessionOption
IsValidURL
LeaveCriticalSection
InterlockedIncrement
EnterCriticalSection
InterlockedDecrement
MultiByteToWideChar
GetModuleFileNameA
GetLastError
WideCharToMultiByte
lstrlenW
SizeofResource
LoadResource
FindResourceA
LoadLibraryExA
lstrcmpiA
lstrcpynA
IsDBCSLeadByte
GetModuleHandleA
lstrcatA
lstrcmpiW
ExitProcess
FreeResource
GetLocalTime
lstrcatW
lstrcpyW
GetVolumeInformationA
CreateProcessA
CloseHandle
TerminateThread
WaitForSingleObject
CreateThread
SetFileTime
DeleteCriticalSection
GetFileTime
CreateFileA
Process32Next
Module32First
TerminateProcess
FlushFileBuffers
SetStdHandle
GetThreadLocale
GetSystemInfo
VirtualProtect
LCMapStringW
LCMapStringA
SetFilePointer
GetStringTypeW
GetStringTypeA
GetCPInfo
GetOEMCP
IsBadCodePtr
IsBadReadPtr
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
GetStdHandle
WriteFile
InitializeCriticalSection
GetLocaleInfoA
GetACP
GetVersionExA
InterlockedExchange
Sleep
LoadLibraryA
GetCurrentProcessId
GetProcAddress
FreeLibrary
lstrlenA
lstrcpyA
DisableThreadLibraryCalls
GetCurrentProcess
SetHandleCount
SetUnhandledExceptionFilter
IsBadWritePtr
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
TlsAlloc
GetTickCount
QueryPerformanceCounter
GetCommandLineA
TlsSetValue
GetCurrentThreadId
GetSystemTimeAsFileTime
HeapAlloc
HeapReAlloc
RaiseException
HeapFree
RtlUnwind
LocalFree
HeapSize
VirtualQuery
SetLastError
TlsGetValue
TlsFree
CharNextA
GetLastActivePopup
SetTimer
LoadStringA
IsZoomed
CloseWindow
GetFocus
DestroyMenu
IsWindow
GetActiveWindow
EnableWindow
IsDlgButtonChecked
GetMenuItemCount
wsprintfA
GetScrollPos
SetCaretBlinkTime
GetKeyboardType
OpenIcon
FindWindowA
GetDlgCtrlID
GetSubMenu
CreateDialogParamA
FlashWindow
KillTimer
GetKeyboardLayout
wsprintfW
CallMsgFilterA
GetMenuCheckMarkDimensions
GetBkColor
RegCreateKeyA
RegSetValueExA
RegOpenKeyA
RegQueryInfoKeyA
RegEnumKeyExA
RegCreateKeyExA
RegDeleteValueA
RegEnumKeyA
RegOpenKeyExA
RegCloseKey
RegDeleteKeyA
RegQueryValueExA
SHGetSpecialFolderPathA
ShellExecuteA
CoCreateInstance
CoTaskMemFree
CoTaskMemAlloc
CoTaskMemRealloc
StringFromCLSID
StringFromGUID2
SafeArrayAccessData
SafeArrayGetLBound
SafeArrayGetUBound
SafeArrayUnaccessData
SysStringLen
LoadRegTypeLi
UnRegisterTypeLi
LoadTypeLi
SysAllocString
RegisterTypeLi
SysFreeString
VarUI4FromStr
VariantInit
DispCallFunc
VariantClear
PathFindExtensionA
InitCommonControlsEx
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ