DllCanUnloadNow
DllGetClassObject
DllRegisterServer
Static task
static1
Behavioral task
behavioral1
Sample
85c826437e377735582668e54248323b_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
85c826437e377735582668e54248323b_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
85c826437e377735582668e54248323b_JaffaCakes118
Size
294KB
MD5
85c826437e377735582668e54248323b
SHA1
33a9c6e57ab7794bc947a959eabb18d3ca946318
SHA256
93c5ffc7b6d6556b8f82120b385767a638c2e224c20943db3bfdd0b7fddb8a63
SHA512
a7793bb72d561b31a5282ea8b3205d6a88bfcb5d9a9359fc1a7fe99a7f903d37cce331f1ad09113755d2e4b3f40d7e8de009e2f57ce5ba11408627e2b0fb0a8a
SSDEEP
6144:IFnYidnN34cMy0LsDcnuUwLfdsJY86N/o30KJL4wL:yNIcM9sDrryggkIL4wL
Checks for missing Authenticode signature.
resource |
---|
85c826437e377735582668e54248323b_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
SHDeleteKeyA
ord3830
ord3353
ord2976
ord2985
ord3262
ord3136
ord4465
ord3259
ord3147
ord2982
ord540
ord800
ord860
ord4202
ord2764
ord825
ord823
ord614
ord6877
ord6648
ord6779
ord353
ord5773
ord5442
ord1979
ord665
ord6385
ord537
ord4278
ord3831
ord858
ord939
ord4129
ord535
ord924
ord922
ord3825
ord3079
ord4080
ord4622
ord4424
ord3579
ord859
ord923
ord5608
ord925
ord4204
ord5710
ord690
ord1988
ord3318
ord2803
ord5207
ord389
ord1158
ord6876
ord861
ord6778
ord1601
ord6143
ord6883
ord536
ord6662
ord6663
ord2915
ord2763
ord801
ord772
ord500
ord541
ord4277
ord926
ord1105
ord290
ord539
ord2818
ord1200
ord6467
ord1154
ord2486
ord940
ord5683
ord941
_onexit
atof
rand
_adjust_fdiv
_wcsicmp
_strcmpi
memcpy
memset
_CxxThrowException
_initterm
??1type_info@@UAE@XZ
?terminate@@YAXXZ
free
_mbscmp
atoi
time
srand
malloc
realloc
rename
printf
localtime
asctime
fopen
__CxxFrameHandler
fputs
fclose
sprintf
strstr
_except_handler3
__dllonexit
LocalFree
GetVersion
GetVersionExA
lstrcmpA
lstrcatA
FindNextFileA
FindFirstFileA
MulDiv
FreeLibrary
lstrcpyA
lstrcpynA
ReadFile
OpenFile
WriteFile
GetProcAddress
LoadLibraryA
TerminateProcess
OpenProcess
Process32Next
Process32First
CreateToolhelp32Snapshot
GetSystemDirectoryA
GetLastError
GetCurrentProcess
CopyFileA
ExpandEnvironmentStringsA
CreateProcessA
DeleteFileA
GetLocaleInfoA
Sleep
WideCharToMultiByte
InterlockedIncrement
InterlockedDecrement
MultiByteToWideChar
ResumeThread
CreateThread
lstrlenA
GetWindowsDirectoryA
CloseHandle
GetFileSize
CreateFileA
GetModuleFileNameA
GetExitCodeProcess
ScreenToClient
ClientToScreen
ShowWindow
SetDlgItemTextA
ReleaseDC
IsCharAlphaNumericA
IsWindow
PostMessageA
GetParent
GetWindowThreadProcessId
IsChild
SetWindowTextA
MessageBoxA
CallWindowProcA
GetDlgItemTextA
EndDialog
GetDlgItem
GetWindowDC
GetDC
SetWindowPos
GetWindowRect
GetDesktopWindow
GetCursorPos
DialogBoxParamA
GetSystemMetrics
EnumWindows
SetFocus
WaitForInputIdle
GetForegroundWindow
MessageBoxW
wsprintfA
SetForegroundWindow
EnableWindow
SetWindowLongA
SendMessageA
FindWindowExA
CreateCompatibleBitmap
CreateCompatibleDC
SelectObject
SetPixel
DeleteObject
GetDeviceCaps
SetBkColor
CreateSolidBrush
SetTextColor
CreateFontA
BitBlt
RegQueryValueExA
RegOpenKeyExA
RegSetValueExA
RegCloseKey
RegCreateKeyExA
OpenProcessToken
LookupPrivilegeValueA
RegDeleteValueA
RegDeleteKeyA
AdjustTokenPrivileges
RegEnumKeyExA
SHFileOperationA
ShellExecuteA
ord252
CoUninitialize
CoCreateInstance
CoInitialize
SysFreeString
VariantClear
SysAllocStringLen
SysStringByteLen
VariantInit
VariantCopy
SysAllocString
SafeArrayCreateVector
SafeArrayAccessData
SafeArrayUnaccessData
SysStringLen
OleSavePictureFile
OleLoadPicturePath
GetErrorInfo
SysAllocStringByteLen
FindCloseUrlCache
DeleteUrlCacheEntry
FindFirstUrlCacheEntryA
InternetOpenUrlA
FtpCreateDirectoryA
FtpFindFirstFileA
FtpOpenFileA
InternetWriteFile
InternetFindNextFileA
InternetOpenA
InternetConnectA
HttpOpenRequestA
HttpSendRequestA
FindNextUrlCacheEntryA
InternetCloseHandle
InternetReadFile
WSACleanup
inet_ntoa
gethostbyname
WSAStartup
CertCloseStore
CertOpenSystemStoreA
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ