DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
8212ab5ad343e530d60e907cd60e3d8f_JaffaCakes118.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
8212ab5ad343e530d60e907cd60e3d8f_JaffaCakes118.dll
Resource
win10v2004-20240730-en
Target
8212ab5ad343e530d60e907cd60e3d8f_JaffaCakes118
Size
256KB
MD5
8212ab5ad343e530d60e907cd60e3d8f
SHA1
7fbb4d6e83848023f3e84c765f7331e25384bc9d
SHA256
9c75bc44a24850f392aa771b0674fbd5e41cb9c5fb5c95749f4a3b3a86a93bb2
SHA512
a7225dc1392eb9e22798fd35b5eea723743000b8ab2ab598f12188d741941d7e8efd405796a1b3837f3c64a73db606f89c18c7555a140a96cb7fe8c643cfecc5
SSDEEP
3072:xNqgXKJKSPF3NFWRmnPxMKIh7//YnjUzH8UhDuOYolwwXdYtQyeC7Y/kTXUugrLT:xNpaJKWFeJuOYQXWGye3kOvPv1IhNHq
Checks for missing Authenticode signature.
resource |
---|
8212ab5ad343e530d60e907cd60e3d8f_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
LeaveCriticalSection
InterlockedIncrement
EnterCriticalSection
InterlockedDecrement
MultiByteToWideChar
GetModuleFileNameA
GetLastError
WideCharToMultiByte
lstrlenW
SizeofResource
LoadResource
FindResourceA
LoadLibraryExA
lstrcmpiA
lstrcpynA
IsDBCSLeadByte
GetModuleHandleA
lstrcatA
lstrcmpiW
ExitProcess
lstrcatW
lstrcpyW
GetVolumeInformationA
CreateProcessA
CloseHandle
TerminateThread
WaitForSingleObject
CreateThread
SetFileTime
WriteFile
GetFileTime
CreateFileA
GetCurrentProcess
DeleteCriticalSection
SetStdHandle
VirtualQuery
GetSystemInfo
VirtualProtect
LCMapStringW
LCMapStringA
SetFilePointer
GetStringTypeW
GetStringTypeA
InitializeCriticalSection
GetThreadLocale
GetLocaleInfoA
GetACP
GetVersionExA
InterlockedExchange
LoadLibraryA
GetProcAddress
FreeLibrary
lstrlenA
lstrcpyA
FreeResource
Sleep
IsBadCodePtr
IsBadReadPtr
GetCPInfo
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
IsBadWritePtr
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
SetUnhandledExceptionFilter
TlsAlloc
TlsGetValue
FlushFileBuffers
DisableThreadLibraryCalls
RtlUnwind
RaiseException
HeapFree
HeapReAlloc
HeapAlloc
GetSystemTimeAsFileTime
GetCurrentThreadId
TlsSetValue
GetCommandLineA
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
TerminateProcess
HeapSize
TlsFree
SetLastError
GetDoubleClickTime
GetKBCodePage
SetTimer
GetKeyboardLayout
CharNextA
wsprintfA
KillTimer
wsprintfW
EnumWindows
LoadStringA
RegCreateKeyA
RegOpenKeyA
RegQueryInfoKeyA
RegEnumKeyExA
RegCreateKeyExA
RegDeleteValueA
RegQueryValueExA
RegEnumKeyA
RegOpenKeyExA
RegCloseKey
RegDeleteKeyA
RegSetValueExA
ShellExecuteA
SHGetSpecialFolderPathA
StringFromGUID2
CoCreateInstance
CoTaskMemFree
CoTaskMemAlloc
StringFromCLSID
CoTaskMemRealloc
LoadTypeLi
DispCallFunc
SafeArrayAccessData
SafeArrayGetLBound
SafeArrayGetUBound
SafeArrayUnaccessData
SysStringLen
LoadRegTypeLi
UnRegisterTypeLi
VariantInit
SysAllocString
RegisterTypeLi
SysFreeString
VarUI4FromStr
VariantClear
PathFindExtensionA
InitCommonControlsEx
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ