DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
87048fdf9e4e0edd5ccf7d7ef3e3a988_JaffaCakes118.dll
Resource
win7-20240708-en
Target
87048fdf9e4e0edd5ccf7d7ef3e3a988_JaffaCakes118
Size
75KB
MD5
87048fdf9e4e0edd5ccf7d7ef3e3a988
SHA1
8790014064598a23879e45d18e194b681db58bb7
SHA256
5a929edaa31c8502b68b9b0c2e0170d5a6260f225721df531c973c35b83bf51c
SHA512
a42c377c9a81318451a6e4200e6d921091bc625a39ff438bb6107be7dd615668cba23cc1d7533634c2a1b7e1d17ba77a43bd9494b2ae770ba1336d2c43f4b8c2
SSDEEP
1536:8YFziGnAbZTooSwfVtlVjOmKOhfEL7bGb/TRUtg4/UC:8YAGAlrnlZOmKOpEnbGb/je
Checks for missing Authenticode signature.
resource |
---|
87048fdf9e4e0edd5ccf7d7ef3e3a988_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
ReadFile
GetFileSize
CreateFileA
lstrlenW
WideCharToMultiByte
GlobalUnlock
GlobalLock
GlobalAddAtomA
DeleteAtom
DeleteFileA
CopyFileA
MultiByteToWideChar
SetFilePointer
DisableThreadLibraryCalls
GetModuleFileNameA
InitializeCriticalSection
InterlockedIncrement
InterlockedDecrement
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
WritePrivateProfileStringA
GetPrivateProfileStringA
lstrcmpiA
GetPrivateProfileIntA
lstrcpyW
UnmapViewOfFile
GetVersion
GetFileAttributesW
GetModuleHandleW
GetModuleHandleA
GetModuleFileNameW
LoadLibraryW
OutputDebugStringA
LoadLibraryA
SetLastError
GetSystemDirectoryA
GetProcAddress
FreeLibrary
GetCurrentProcessId
CreateFileMappingA
MapViewOfFile
lstrcatA
lstrlenA
lstrcpyA
GetLastError
CreateThread
WaitForSingleObject
CloseHandle
GetExitCodeThread
WriteFile
SetWindowLongA
DefWindowProcA
DestroyMenu
TranslateMessage
DispatchMessageA
SetFocus
IsWindow
DestroyWindow
ReleaseCapture
ShowWindow
LoadMenuA
CallWindowProcA
GetSysColor
EndPaint
BeginPaint
GetMenuItemID
GetMenuItemInfoA
GetMenuItemCount
GetSubMenu
SetWindowTextA
GetWindowTextA
GetWindowLongA
SetWindowPos
RemoveMenu
TrackPopupMenuEx
ClientToScreen
GetMenuStringA
AppendMenuA
CreatePopupMenu
GetWindowRect
DrawFocusRect
SetCursor
GetPropA
RemovePropA
GetParent
SetPropA
wsprintfW
GetClassNameA
FindWindowExA
CreateWindowExA
RegisterClassA
GetClassInfoA
LoadCursorA
GetClientRect
LoadImageA
GetDC
ReleaseDC
GetCursorPos
ScreenToClient
ChildWindowFromPoint
SetCapture
InvalidateRect
SendMessageA
CheckMenuItem
CreatePen
GetTextExtentPoint32A
CreateFontIndirectA
GetTextColor
GetObjectA
CreateCompatibleDC
SelectObject
DeleteDC
MoveToEx
LineTo
SetTextColor
GetStockObject
SetBkMode
DeleteObject
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
DragFinish
ShellExecuteExA
DragQueryFileA
RegisterDragDrop
RevokeDragDrop
ReleaseStgMedium
SysStringLen
LoadRegTypeLi
VariantCopy
SysFreeString
SysAllocString
VariantClear
VariantChangeType
ord30
ord58
ord32
ord57
ord50
ord15
ord21
ord16
ord23
ord51
ord18
InternetSetFilePointer
InternetReadFile
InternetCrackUrlA
InternetConnectA
HttpOpenRequestA
HttpSendRequestA
InternetOpenUrlA
InternetCloseHandle
InternetOpenA
memcpy
atoi
wcscpy
_ftol
wcslen
strncpy
rand
strchr
strcmp
_except_handler3
time
srand
sprintf
_strlwr
??2@YAPAXI@Z
memset
__CxxFrameHandler
calloc
strcat
realloc
strlen
strstr
free
??3@YAXPAX@Z
malloc
_adjust_fdiv
memcmp
_purecall
sscanf
_CxxThrowException
?terminate@@YAXXZ
__dllonexit
??1type_info@@UAE@XZ
_initterm
_onexit
strcpy
_strdup
_strupr
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@PBD@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV?$allocator@D@1@@Z
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@ABV01@@Z
?c_str@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEPBDXZ
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??Y?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@PBD@Z
TransparentBlt
IsValidURL
WSAStartup
gethostname
WSACleanup
gethostbyname
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ