DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
SetupDLLEnvironment
Static task
static1
Behavioral task
behavioral1
Sample
96a0e0cbfcaaefa26d74834c8f7be126_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
96a0e0cbfcaaefa26d74834c8f7be126_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
96a0e0cbfcaaefa26d74834c8f7be126_JaffaCakes118
Size
204KB
MD5
96a0e0cbfcaaefa26d74834c8f7be126
SHA1
d2a493add2d8b947199a2766364e1452709fab76
SHA256
fbc69e982b3b59b4f91ec04f4a5f49e5268524aac1bed0a6cbf6329da7d9888d
SHA512
612efed4e77164a2f9f01e403f193e830cd3625455fb2683ca4d022307cac744e937068a1208f9b629bb02db85f2e8bf0a91ae398624c9df76d4f97c31db6e13
SSDEEP
3072:DUYa+BFf5NUxmqxNbU/aBMMzAvEXS8o3mV5t91C3abkgs1Iy1nR30XXtvlX2XMbr:a+PBm3LAvECWDM3zXn30XXtNX2XMVL
Checks for missing Authenticode signature.
resource |
---|
96a0e0cbfcaaefa26d74834c8f7be126_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
ord14
ord13
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
DeleteCriticalSection
FreeLibrary
DisableThreadLibraryCalls
HeapDestroy
LoadLibraryA
GetProcAddress
GetLastError
lstrlenA
lstrcatA
WideCharToMultiByte
lstrlenW
LocalFree
InterlockedDecrement
InterlockedIncrement
GetPrivateProfileIntA
MultiByteToWideChar
lstrcpyA
GetModuleFileNameA
LoadStringA
CharNextA
wsprintfA
MessageBoxA
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
ProgIDFromCLSID
CoCreateInstance
CoTaskMemFree
CLSIDFromProgID
CoDisconnectObject
CoCreateGuid
CLSIDFromString
SysFreeString
SysAllocString
SetErrorInfo
CreateErrorInfo
SafeArrayAccessData
VariantChangeType
VariantInit
SafeArrayCreate
SafeArrayCopy
SafeArrayGetDim
SafeArrayUnaccessData
SafeArrayGetLBound
SafeArrayGetUBound
SysStringLen
VariantCopy
VariantClear
LoadTypeLi
LoadRegTypeLi
RegisterTypeLi
VariantTimeToSystemTime
GetErrorInfo
mktime
strcat
_wcsicmp
malloc
_initterm
_adjust_fdiv
_fstat
_strlwr
fopen
??1type_info@@UAE@XZ
_onexit
?terminate@@YAXXZ
_except_handler3
__dllonexit
_mbsicmp
wcslen
_CxxThrowException
strlen
strncmp
strcmp
wcsstr
sprintf
swprintf
fprintf
free
??3@YAXPAX@Z
memcmp
__CxxFrameHandler
_EH_prolog
memcpy
??2@YAPAXI@Z
_purecall
localtime
time
fclose
fread
ctime
wcschr
strcpy
_findclose
_findnext
_findfirst
fflush
rename
remove
ftell
vfprintf
??1_Lockit@std@@QAE@XZ
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
??Mstd@@YA_NABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@0@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
??0_Lockit@std@@QAE@XZ
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
SetupDLLEnvironment
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ