DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
8a85833242810213059feadb4a805bbc_JaffaCakes118.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
8a85833242810213059feadb4a805bbc_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
8a85833242810213059feadb4a805bbc_JaffaCakes118
Size
48KB
MD5
8a85833242810213059feadb4a805bbc
SHA1
dcedd69ccc96269df1e8069a50f55f00c72ab0bf
SHA256
4ac9728a866017ac9f2e726f7f079153180812896e5976f127891b3ab773d3ac
SHA512
03ec7a11811e0014f1e25b23db0da34841282cefb55403d297a5d8d48b564bec8d0e65cf97311491dbc591a2359b50a7669f7372c5ec9d99281137166c2b4133
SSDEEP
768:zlUfZemK9tdud2570ejUJidHEM+UZyBXZvfn+i7sOjokrdE91sEOUSnXC:Zqz4ud/xi+3X1f+iDJEDsPy
Checks for missing Authenticode signature.
resource |
---|
8a85833242810213059feadb4a805bbc_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetVersionExA
HeapCreate
HeapDestroy
lstrlenW
MultiByteToWideChar
lstrlenA
GetShortPathNameA
GetModuleHandleA
GetModuleFileNameA
CloseHandle
LoadLibraryA
GetCommandLineW
GetLocalTime
GetSystemInfo
WritePrivateProfileStringA
GetCurrentProcessId
GetProcAddress
Sleep
CreateThread
WideCharToMultiByte
Process32Next
Process32First
DeleteFileA
GetLastError
GetWindowsDirectoryA
GetSystemDirectoryA
CreateEventA
HeapAlloc
InterlockedDecrement
EnterCriticalSection
InterlockedIncrement
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
DisableThreadLibraryCalls
PostMessageA
DefWindowProcA
RegisterClassExA
CreateWindowExA
ShowWindow
TranslateMessage
DispatchMessageA
SetWindowTextA
SendMessageA
CallNextHookEx
KillTimer
SetTimer
IsWindow
FindWindowExA
GetMessageA
RegQueryValueExA
RegOpenKeyExA
RegSetValueExA
RegCreateKeyExA
RegCloseKey
CommandLineToArgvW
CoCreateInstance
SysAllocString
VariantClear
SysStringLen
LoadRegTypeLi
SysFreeString
fopen
fwrite
_strlwr
fclose
strcmp
strcpy
strstr
free
_initterm
malloc
_adjust_fdiv
_stricmp
strchr
strcat
_access
strrchr
sprintf
rand
strlen
memcmp
memcpy
memset
??2@YAPAXI@Z
_purecall
??3@YAXPAX@Z
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ