DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
GetTckValue
Static task
static1
Behavioral task
behavioral1
Sample
8d42ff035b3f1dfebd2d3b001bf892c6_JaffaCakes118.dll
Resource
win7-20240708-en
Target
8d42ff035b3f1dfebd2d3b001bf892c6_JaffaCakes118
Size
139KB
MD5
8d42ff035b3f1dfebd2d3b001bf892c6
SHA1
7950dc91554cc22a826cff0774cb9c88838133bf
SHA256
a9253b7a6ce5f0fb96cf0ad7d619849e0c8c5e21826580443fc6475ed158d1f5
SHA512
39272bb33f6d711cc045e6126aa4b6e904d5934a442e4d804898ce45fa53c9262b1a7450d1de537643440ee19f46de9ac304085b29b1a87116850c6ed5e0b7a5
SSDEEP
3072:2WBhCAYsxYDoLHD2VXShgv9cmt+6a5Cxb:503IjMSY5U6N
Checks for missing Authenticode signature.
resource |
---|
8d42ff035b3f1dfebd2d3b001bf892c6_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
HttpSendRequestA
HttpQueryInfoA
InternetCrackUrlA
InternetSetCookieA
InternetGetConnectedState
HttpOpenRequestA
PathFileExistsA
StrStrIA
wnsprintfA
lstrlenA
GetModuleHandleW
WideCharToMultiByte
LeaveCriticalSection
MultiByteToWideChar
lstrlenW
SetThreadLocale
GetThreadLocale
GetProcAddress
EnterCriticalSection
FindResourceA
FreeLibrary
LoadResource
SizeofResource
IsDBCSLeadByte
lstrcmpiA
LoadLibraryExA
HeapReAlloc
CreateFileA
lstrcmpA
HeapAlloc
GetCurrentProcess
HeapFree
DeleteCriticalSection
GetProcessHeap
WriteFile
TerminateThread
Sleep
CreateProcessA
LoadLibraryA
CreateMutexA
ReleaseMutex
CloseHandle
GetTempPathA
LocalFree
CreateThread
GetVolumeInformationA
SetLastError
lstrcpyA
GetSystemTimeAsFileTime
SetFilePointer
GetModuleHandleA
GetModuleFileNameA
GetLastError
RaiseException
InitializeCriticalSection
InterlockedDecrement
InterlockedIncrement
GetConsoleCP
GetConsoleMode
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
FlushFileBuffers
WaitForSingleObject
LCMapStringW
LCMapStringA
GetLocaleInfoA
GetStringTypeW
InitializeCriticalSectionAndSpinCount
RtlUnwind
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
SetHandleCount
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
GetCurrentThreadId
GetCommandLineA
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
HeapSize
ExitProcess
HeapCreate
HeapDestroy
VirtualFree
GetStdHandle
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetStringTypeA
CharNextA
CharNextW
SetTokenInformation
RegOpenKeyA
RegCreateKeyA
RegQueryValueExA
GetLengthSid
DuplicateTokenEx
ConvertStringSidToSidW
OpenProcessToken
RegDeleteValueA
RegCreateKeyExA
RegEnumKeyExA
RegSetValueExA
RegCloseKey
RegQueryInfoKeyA
RegOpenKeyExA
RegDeleteKeyA
ShellExecuteA
StringFromGUID2
CoTaskMemRealloc
CoTaskMemFree
CoTaskMemAlloc
CoCreateInstance
LoadRegTypeLi
VarUI4FromStr
SysAllocStringLen
VariantInit
VariantClear
RegisterTypeLi
UnRegisterTypeLi
LoadTypeLi
SysStringLen
SysAllocString
SysFreeString
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
GetTckValue
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ