DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
882b8eedc79357a6f511c51cbf4d67cb_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
882b8eedc79357a6f511c51cbf4d67cb_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
882b8eedc79357a6f511c51cbf4d67cb_JaffaCakes118
Size
248KB
MD5
882b8eedc79357a6f511c51cbf4d67cb
SHA1
3cf25de381288147ea5f52e0e43c7404fad1d306
SHA256
46f84ca783f0c4dd6d9dbbc81c298b44842464b5d998ea3a32b4d77a6cbd4385
SHA512
7b92b9804a61fe139c74be32c80714c972bf080861132b1fce8df76f23398620f537eee578089bc4317c6fe6c27e02828468bb51040c68cd73adbdd447ef000b
SSDEEP
6144:0NI5c1+XLxQSHwfZx6GLYudQebz2d3P4us69U:0K5i+XLOS0foxMz2ZdsK
Checks for missing Authenticode signature.
resource |
---|
882b8eedc79357a6f511c51cbf4d67cb_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
EnterCriticalSection
InterlockedDecrement
InitializeCriticalSection
MultiByteToWideChar
GetModuleFileNameA
GetLastError
WideCharToMultiByte
lstrlenW
SizeofResource
LoadResource
FindResourceA
LoadLibraryExA
lstrcmpiA
lstrcpynA
IsDBCSLeadByte
GetModuleHandleA
lstrcatA
lstrcmpiW
ExitProcess
lstrcatW
lstrcpyW
GetVolumeInformationA
CreateProcessA
CloseHandle
TerminateThread
WaitForSingleObject
CreateThread
SetFileTime
WriteFile
GetFileTime
CreateFileA
Process32Next
Module32First
InterlockedIncrement
IsBadCodePtr
IsBadReadPtr
FlushFileBuffers
SetStdHandle
VirtualQuery
GetSystemInfo
VirtualProtect
LCMapStringW
LCMapStringA
LeaveCriticalSection
DeleteCriticalSection
GetThreadLocale
GetLocaleInfoA
GetACP
GetVersionExA
InterlockedExchange
DisableThreadLibraryCalls
Sleep
LoadLibraryA
GetProcAddress
FreeLibrary
lstrlenA
SetFilePointer
GetStringTypeW
GetStringTypeA
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
SetUnhandledExceptionFilter
IsBadWritePtr
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
TlsAlloc
GetCPInfo
lstrcpyA
LocalFree
RtlUnwind
HeapFree
RaiseException
HeapReAlloc
HeapAlloc
GetSystemTimeAsFileTime
GetCurrentThreadId
TlsSetValue
GetCommandLineA
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
TerminateProcess
GetCurrentProcess
HeapSize
TlsFree
SetLastError
TlsGetValue
GetOEMCP
SetTimer
LoadStringA
CharNextA
wsprintfA
KillTimer
wsprintfW
CreateMenu
GetDoubleClickTime
RegDeleteValueA
RegSetValueExA
RegOpenKeyA
RegQueryInfoKeyA
RegEnumKeyExA
RegCreateKeyExA
RegCreateKeyA
RegEnumKeyA
RegOpenKeyExA
RegCloseKey
RegDeleteKeyA
RegQueryValueExA
SHGetSpecialFolderPathA
ShellExecuteA
CoTaskMemFree
CoTaskMemAlloc
StringFromCLSID
StringFromGUID2
CoTaskMemRealloc
CoCreateInstance
SafeArrayAccessData
SafeArrayGetLBound
SafeArrayGetUBound
SafeArrayUnaccessData
SysStringLen
LoadRegTypeLi
UnRegisterTypeLi
LoadTypeLi
SysAllocString
RegisterTypeLi
SysFreeString
VarUI4FromStr
VariantInit
DispCallFunc
VariantClear
PathFindExtensionA
InitCommonControlsEx
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ