DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
8ef9b8042151550317b95ee6cd2ae148_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
8ef9b8042151550317b95ee6cd2ae148_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
8ef9b8042151550317b95ee6cd2ae148_JaffaCakes118
Size
80KB
MD5
8ef9b8042151550317b95ee6cd2ae148
SHA1
5c7b191049a28fdec94f9d131370dc6adc5cf49a
SHA256
2e9609f37855671d76dad714fd3e349da94dcdd19ed08a4e676e2c93638aa6eb
SHA512
c7d67208a5e7479ee87dc4cca300567df651780e3f7c984c4a5941301dc934359e9efe666dc4d64fa872545c9487a02b894372670ef58f6fd26f00dfbccb11b8
SSDEEP
1536:DSY4VZu2nMDkDbxJvJ9DAefx50DL1oqfUZdF+SDv:DeZTnWk7x9DtfxIL15fUzF+Kv
Checks for missing Authenticode signature.
resource |
---|
8ef9b8042151550317b95ee6cd2ae148_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
ord6663
ord1176
ord1575
ord1168
ord1577
ord1182
ord1243
ord1197
ord1570
ord1253
ord1255
ord1578
ord600
ord826
ord269
ord539
ord861
ord1601
ord6467
ord1131
ord2725
ord3953
ord561
ord3738
ord4424
ord4622
ord4080
ord3079
ord3825
ord3831
ord3830
ord2976
ord3081
ord2985
ord3262
ord3136
ord4465
ord3259
ord3147
ord2982
ord5714
ord5289
ord5307
ord4698
ord4079
ord5302
ord5300
ord3346
ord2396
ord5199
ord1089
ord3922
ord5731
ord2512
ord2554
ord4486
ord6375
ord815
ord4274
ord2764
ord6282
ord6283
ord800
ord1228
ord823
ord825
ord2763
ord4129
ord4277
ord5683
ord924
ord5572
ord4278
ord536
ord2915
ord5710
ord858
ord2818
ord540
ord2614
ord537
ord860
ord535
ord342
ord1116
memset
__CxxFrameHandler
strlen
free
malloc
_mbscmp
_mbsnbcpy
_mbschr
strcpy
_except_handler3
memcpy
_purecall
realloc
memcmp
wcscpy
_mbsstr
??1type_info@@UAE@XZ
__dllonexit
_onexit
?terminate@@YAXXZ
_initterm
_adjust_fdiv
InterlockedIncrement
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
GlobalAlloc
GlobalLock
GlobalUnlock
FindResourceA
SizeofResource
LoadResource
GetModuleHandleA
GetCurrentProcess
EnterCriticalSection
GetLastError
LoadLibraryA
GetProcAddress
FreeLibrary
lstrcpyA
GetModuleFileNameA
GetShortPathNameA
InterlockedDecrement
FlushInstructionCache
lstrlenW
MultiByteToWideChar
lstrlenA
WideCharToMultiByte
LoadLibraryExA
lstrcmpiA
lstrcpynA
IsDBCSLeadByte
HeapDestroy
lstrcatA
lstrcmpA
GetCurrentThreadId
LocalFree
LocalAlloc
BeginPaint
FillRect
EndPaint
GetDC
ReleaseDC
IsChild
SetFocus
GetSysColor
SetWindowPos
RedrawWindow
GetClassNameA
GetDesktopWindow
CreateAcceleratorTableA
ReleaseCapture
SetCapture
InvalidateRect
DefWindowProcA
CallWindowProcA
CharNextA
IsWindow
GetClientRect
SetWindowLongA
RegisterClassExA
LoadCursorA
GetClassInfoExA
RegisterWindowMessageA
SetWindowTextA
GetWindowTextA
InvalidateRgn
wsprintfA
SendMessageA
DispatchMessageA
TranslateMessage
GetWindow
GetParent
GetWindowLongA
CreateWindowExA
GetDlgItem
GetWindowTextLengthA
DestroyWindow
ShowWindow
GetFocus
GetObjectA
CreateSolidBrush
DeleteObject
CreateCompatibleBitmap
CreateCompatibleDC
SelectObject
BitBlt
DeleteDC
GetStockObject
GetDeviceCaps
RegCreateKeyA
RegOpenKeyA
RegQueryValueExA
RegSetValueExA
RegDeleteValueA
RegDeleteKeyA
RegOpenKeyExA
RegEnumValueA
RegEnumKeyExA
RegCreateKeyExA
RegQueryInfoKeyA
RegCloseKey
OleLockRunning
CLSIDFromString
CLSIDFromProgID
StringFromCLSID
OleUninitialize
CoCreateInstance
CoTaskMemRealloc
CoTaskMemAlloc
CreateStreamOnHGlobal
CoTaskMemFree
OleInitialize
ord253
SysAllocStringLen
VariantInit
SysStringLen
LoadRegTypeLi
RegisterTypeLi
LoadTypeLi
SysAllocString
SysFreeString
VarUI4FromStr
DispCallFunc
VariantClear
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ