DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
8ce10b80e017e392f83f2ec7aa58a2ef_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
8ce10b80e017e392f83f2ec7aa58a2ef_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
8ce10b80e017e392f83f2ec7aa58a2ef_JaffaCakes118
Size
32KB
MD5
8ce10b80e017e392f83f2ec7aa58a2ef
SHA1
23397cd8676f209d85af4077508facfa8ec20c82
SHA256
fa7ba93704ad7be3e5ea708a3eae4362f9711c5d4dfc867b75f7bcee61a1e661
SHA512
ffbe302958264a88658d2a40bef731a3d5b6b598bf0feccd8fc1495a20c62217db95037c3d2f253953741ac3530d81611190243f604cf6045dab83b7de7a211d
SSDEEP
768:Q9/VC7Bg+tM5nrnvzx0GN73JtMR7NZiCS:Q9/Q7Bg+sDd34RZZK
Checks for missing Authenticode signature.
resource |
---|
8ce10b80e017e392f83f2ec7aa58a2ef_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
EnableWindow
FillRect
RegSetValueExA
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
RegCreateKeyExA
GetStockObject
Ellipse
GetNetworkParams
ord1877
ord924
ord5572
ord2915
ord800
ord540
ord4249
ord2486
ord2687
ord6364
ord3326
ord6365
ord4472
ord5498
ord3278
ord3353
ord3681
ord446
ord743
ord1177
ord1226
ord1210
ord2439
ord1693
ord5618
ord994
ord4342
ord4687
ord4639
ord5674
ord2156
ord4856
ord4920
ord6002
ord2137
ord1963
ord5213
ord2953
ord3868
ord5150
ord4705
ord4707
ord2876
ord2998
ord5649
ord4113
ord4661
ord4660
ord4768
ord4650
ord4903
ord4548
ord4521
ord4594
ord4988
ord4925
ord4930
ord4935
ord4659
ord4909
ord4908
ord4668
ord4667
ord4666
ord4648
ord4689
ord5023
ord4654
ord4643
ord4354
ord4780
ord4649
ord4637
ord4636
ord5060
ord4584
ord4371
ord4361
ord823
ord4739
ord4741
ord4738
ord4409
ord4603
ord5008
ord4415
ord4992
ord4979
ord2488
ord3404
ord4539
ord2954
ord6055
ord4078
ord1776
ord4407
ord5241
ord2384
ord5163
ord6370
ord4353
ord5290
ord3798
ord4837
ord4441
ord2648
ord2055
ord6376
ord3749
ord5065
ord1727
ord5261
ord2446
ord2124
ord5277
ord2983
ord3148
ord3260
ord4466
ord1131
ord2986
ord3080
ord4081
ord4624
ord5825
ord723
ord3946
ord423
ord2860
ord1601
ord4202
ord858
ord537
ord5333
ord2541
ord941
ord939
ord539
ord860
ord2956
ord4949
ord5710
ord6030
ord2614
ord1892
ord4252
ord1212
ord4570
ord4672
ord4843
ord5011
ord5265
ord4376
ord4853
ord4998
ord4713
ord2514
ord6052
ord1775
ord2385
ord6371
ord5286
ord4438
ord3279
ord4625
ord4425
ord449
ord746
ord2278
ord269
ord1227
ord6467
ord1168
ord1216
ord6354
ord2724
ord3952
ord825
ord561
ord3670
ord4424
ord4622
ord4080
ord3079
ord3825
ord3831
ord3830
ord3401
ord2976
ord3081
ord2985
ord3262
ord3136
ord4465
ord3259
ord3147
ord2982
ord5714
ord5289
ord5307
ord4698
ord4079
ord5302
ord5300
ord3346
ord2396
ord5199
ord1089
ord3922
ord5731
ord2512
ord2554
ord4486
ord6375
ord815
ord826
ord600
ord1578
ord1255
ord1253
ord1570
ord1197
ord1243
ord342
ord1182
ord1577
ord1575
ord1176
ord1116
ord1132
ord4356
ord3269
_stricmp
strstr
malloc
free
memcpy
memset
strlen
_strlwr
strcmp
wcslen
wcsncpy
atol
sprintf
strcpy
strcat
__CxxFrameHandler
__dllonexit
_onexit
_initterm
_adjust_fdiv
??1type_info@@UAE@XZ
_except_handler3
GetProcAddress
GetLastError
GetExitCodeProcess
WaitForSingleObject
GetTempPathA
CreateThread
DeleteFileA
lstrlenA
lstrlenW
WideCharToMultiByte
GetSystemDirectoryA
CreateFileA
WriteFile
CloseHandle
GetWindowsDirectoryA
GetVersionExA
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
GetModuleHandleA
SetFilePointer
ReadFile
GetFileSize
SetFileAttributesA
LocalFree
LocalAlloc
CreateProcessA
CoCreateInstance
LoadRegTypeLi
SysFreeString
??0_Lockit@std@@QAE@XZ
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??1_Lockit@std@@QAE@XZ
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ