DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
8a5cb1dd8f5517aa8b7a4f9a54d14aa9_JaffaCakes118.dll
Resource
win7-20240704-en
Target
8a5cb1dd8f5517aa8b7a4f9a54d14aa9_JaffaCakes118
Size
164KB
MD5
8a5cb1dd8f5517aa8b7a4f9a54d14aa9
SHA1
f20207f1700df1441b68a837f526127254733458
SHA256
11efcfc6497c27fedfe13f6beda577f2614aecdcb92250d44fc01571ef005798
SHA512
c95c3fd59cb4a3e4e2d60c457bb47919de65baf6ec723dbe172b41e2b94695f34ea678d775a15b5cd6e6ec2206340676d24d9bebde66f5f7ef2c5e1899118148
SSDEEP
3072:no7I+7AJmsPQyCYNLA91h08AhI2gpYQaDgldGHMw/:otfgQyBNgMZh/UXeAJw/
Checks for missing Authenticode signature.
resource |
---|
8a5cb1dd8f5517aa8b7a4f9a54d14aa9_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
lstrlenA
CompareStringA
CompareStringW
DeleteFileA
CloseHandle
ReadFile
GetFileSize
CreateFileA
MoveFileA
GetSystemDirectoryA
HeapFree
GetProcessHeap
SetLastError
GlobalUnlock
GlobalLock
GlobalAlloc
EnterCriticalSection
LeaveCriticalSection
MulDiv
HeapAlloc
FlushInstructionCache
GetCurrentProcess
lstrcmpA
GetModuleFileNameA
GetCurrentThreadId
InterlockedIncrement
InterlockedDecrement
lstrcpynA
lstrcpyA
lstrcatA
IsDBCSLeadByte
FreeLibrary
LoadLibraryExA
GetModuleHandleA
DisableThreadLibraryCalls
CreateThread
HeapReAlloc
GetLastError
RaiseException
LocalFree
WideCharToMultiByte
FlushFileBuffers
SetStdHandle
LoadLibraryA
SetFilePointer
IsBadCodePtr
IsBadReadPtr
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
WriteFile
UnhandledExceptionFilter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
LCMapStringW
LCMapStringA
GetTimeZoneInformation
GetStringTypeW
GetStringTypeA
TlsGetValue
TlsSetValue
TlsFree
TlsAlloc
GetCPInfo
GetOEMCP
SetUnhandledExceptionFilter
TerminateProcess
GetProcAddress
IsBadWritePtr
VirtualFree
HeapCreate
ExitProcess
GetCommandLineA
GetSystemTimeAsFileTime
RtlUnwind
VirtualQuery
GetSystemInfo
MultiByteToWideChar
VirtualAlloc
VirtualProtect
HeapSize
lstrcmpiA
lstrlenW
FindResourceExA
FindResourceA
LoadResource
LockResource
SizeofResource
DeleteCriticalSection
InitializeCriticalSection
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
SetEnvironmentVariableA
InterlockedExchange
HeapDestroy
UnregisterClassA
EndDialog
CheckDlgButton
IsDlgButtonChecked
GetDlgItem
MoveWindow
EndPaint
SetRect
DestroyWindow
SetWindowLongA
GetWindowTextA
GetWindowTextLengthA
SetWindowPos
EnumChildWindows
EnumThreadWindows
SystemParametersInfoA
CopyRect
wsprintfA
CreateAcceleratorTableA
CharNextA
GetParent
GetClassNameA
RedrawWindow
IsWindow
SendMessageA
GetFocus
IsChild
SetFocus
BeginPaint
GetSysColor
CallWindowProcA
GetDesktopWindow
InvalidateRgn
InvalidateRect
ReleaseDC
GetDC
GetClientRect
FillRect
SetCapture
ReleaseCapture
DestroyAcceleratorTable
GetWindowLongA
SetWindowTextA
DefWindowProcA
RegisterWindowMessageA
GetClassInfoExA
LoadCursorA
RegisterClassExA
CreateWindowExA
GetWindow
MapDialogRect
SetWindowContextHelpId
GetStockObject
GetObjectA
GetDeviceCaps
BitBlt
CreateCompatibleDC
CreateCompatibleBitmap
DeleteDC
SelectObject
DeleteObject
CreateSolidBrush
RegSetValueExA
RegCreateKeyExA
RegCloseKey
RegDeleteValueA
RegDeleteKeyA
RegQueryInfoKeyA
RegOpenKeyExA
RegEnumKeyExA
OleInitialize
CreateStreamOnHGlobal
CoTaskMemRealloc
CoTaskMemFree
OleUninitialize
StringFromGUID2
CoTaskMemAlloc
OleLockRunning
CoGetClassObject
CLSIDFromProgID
CLSIDFromString
CoCreateInstance
SysAllocStringByteLen
VarUI4FromStr
RegisterTypeLi
UnRegisterTypeLi
LoadTypeLi
LoadRegTypeLi
VariantInit
VariantClear
OleCreateFontIndirect
SysStringByteLen
SysFreeString
SysAllocString
SysAllocStringLen
SysStringLen
SHSetValueA
SHGetValueA
PathFindExtensionA
URLDownloadToFileA
GetUrlCacheEntryInfoA
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ