DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
8cc2b6b0de4f7f792d3ac52989dc71a6_JaffaCakes118.dll
Resource
win7-20240729-en
Target
8cc2b6b0de4f7f792d3ac52989dc71a6_JaffaCakes118
Size
232KB
MD5
8cc2b6b0de4f7f792d3ac52989dc71a6
SHA1
33a77ee5f2b547306d964d8643485de844124496
SHA256
b0dfc6877bea6d8ca3f3639a2b2e647873f62d797c8fad104a3996f7407a445f
SHA512
2131cfe8c88d99f8808c7f9683a8aaf4dec02cca12294e70ddabdc695bc4dd5b40991dd9e91b87f981c83881595f24d71f82256acb7f096f44e112dde27dc356
SSDEEP
3072:+6L43P2rE3ps+xX4+SHC21pqRKbChrFCn8PQtliFDK66gbSxSZ3Zaz0NyorJqbo:T2eJCq9tliJlfSxSwzSBJq
Checks for missing Authenticode signature.
resource |
---|
8cc2b6b0de4f7f792d3ac52989dc71a6_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetProcAddress
LoadLibraryA
LocalFree
Process32Next
Process32First
CreateToolhelp32Snapshot
VirtualFreeEx
WaitForSingleObject
CreateRemoteThread
GetModuleHandleA
WriteProcessMemory
VirtualAllocEx
OpenProcess
CreateProcessA
CopyFileA
CreateMutexA
OpenMutexA
TerminateThread
DisableThreadLibraryCalls
GetModuleFileNameA
HeapAlloc
GetSystemInfo
GetVersionExA
FreeLibrary
InitializeCriticalSection
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
CompareStringW
CompareStringA
FlushFileBuffers
SetStdHandle
GetStringTypeW
GetThreadLocale
IsBadCodePtr
IsBadReadPtr
IsBadWritePtr
VirtualAlloc
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
HeapCreate
ReadFile
GetStringTypeExA
OutputDebugStringA
DebugBreak
InterlockedDecrement
GetTickCount
GetTempPathA
GetTempFileNameA
Sleep
lstrcmpA
InterlockedIncrement
MultiByteToWideChar
lstrlenW
WideCharToMultiByte
CloseHandle
CreateThread
GetLocalTime
GetEnvironmentVariableA
CreateDirectoryA
FindFirstFileA
VirtualFree
HeapDestroy
LCMapStringW
LCMapStringA
GetOEMCP
GetACP
GetCPInfo
HeapSize
GetCurrentProcess
TerminateProcess
ExitProcess
HeapReAlloc
SetUnhandledExceptionFilter
HeapFree
GetVersion
GetCommandLineA
GetSystemTime
GetTimeZoneInformation
SetCurrentDirectoryA
GetCurrentDirectoryA
SetEnvironmentVariableA
RaiseException
RtlUnwind
GetLastError
GetFileAttributesA
DeleteFileA
FindNextFileA
FindClose
lstrlenA
SetFilePointer
WriteFile
CreateFileA
GetFileSize
GetStringTypeA
SetWindowLongA
CharNextA
LoadStringA
SetTimer
DestroyWindow
SendMessageA
KillTimer
BringWindowToTop
SetFocus
SetForegroundWindow
SetActiveWindow
SetWindowPos
CharLowerA
ShowWindow
ReleaseDC
GetDC
wsprintfW
GetWindowLongA
wvsprintfA
GetDeviceCaps
CryptDestroyHash
RegEnumKeyExA
RegQueryInfoKeyA
RegOpenKeyExA
RegCreateKeyExA
RegDeleteKeyA
RegSetValueExA
RegQueryValueExA
CryptAcquireContextA
CryptCreateHash
CryptHashData
CryptGetHashParam
CryptReleaseContext
RegCloseKey
CoCreateInstance
CoInitialize
CoUninitialize
SysFreeString
SysAllocStringLen
VariantClear
SysAllocString
VariantCopy
VariantChangeType
SysStringLen
LoadRegTypeLi
InternetOpenUrlA
InternetCrackUrlA
InternetReadFile
HttpQueryInfoA
HttpOpenRequestA
HttpAddRequestHeadersA
HttpSendRequestA
InternetOpenA
InternetConnectA
InternetAttemptConnect
InternetCloseHandle
Netbios
URLDownloadToFileA
ord58
ord32
ord16
ord57
ord15
ord21
ord23
ord30
ord31
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ