DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
a3dfdc30d90f584fbc98b367af0d9dae_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
a3dfdc30d90f584fbc98b367af0d9dae_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
a3dfdc30d90f584fbc98b367af0d9dae_JaffaCakes118
Size
393KB
MD5
a3dfdc30d90f584fbc98b367af0d9dae
SHA1
6c1c65ef37efa8637876ee07c62754a2a00a401a
SHA256
c8ed608e751b2c6d676e8c59ff8d9d3076170cd9b458f02a9c6621d9c8ec5dcd
SHA512
ad2258267f2ef69db5561578c772d428c67ddad2d08a9de014a4adacd5d10eda54bbf8628ea83348bfa14726a2cda203bb920cf53db6a0cc8981e9eeff2290d3
SSDEEP
6144:+oNNyihxFABTVisfA0GALUNdFw0epUiWe20QNFYuwGd6:+oNNdhxqT+/F2WVrNG
Checks for missing Authenticode signature.
resource |
---|
a3dfdc30d90f584fbc98b367af0d9dae_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PathFindFileNameA
PathFindExtensionA
PathStripToRootA
PathIsUNCA
UrlEscapeA
PathFileExistsA
PlaySoundA
GetAdaptersInfo
InternetQueryDataAvailable
InternetOpenUrlA
InternetReadFile
InternetCloseHandle
InternetOpenA
GetCurrentProcessId
LocalAlloc
TlsGetValue
GlobalReAlloc
GlobalHandle
TlsAlloc
TlsSetValue
LocalReAlloc
TlsFree
SetErrorMode
GlobalFlags
GetCPInfo
GetOEMCP
FileTimeToSystemTime
WritePrivateProfileStringA
FileTimeToLocalFileTime
GetFileAttributesA
GetFileTime
RtlUnwind
GetSystemTimeAsFileTime
HeapFree
HeapAlloc
CreateFileA
VirtualAlloc
GetSystemInfo
VirtualQuery
HeapReAlloc
GetTimeFormatA
GetDateFormatA
GetCommandLineA
GetProcessHeap
ExitProcess
HeapSize
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetACP
LCMapStringA
LCMapStringW
HeapDestroy
HeapCreate
VirtualFree
GetStdHandle
GetTimeZoneInformation
SetHandleCount
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetStringTypeA
GetStringTypeW
GetConsoleCP
GetConsoleMode
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetEnvironmentVariableA
GetFullPathNameA
GetVolumeInformationA
FindFirstFileA
FindClose
GetCurrentProcess
DuplicateHandle
GetThreadLocale
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
GetModuleFileNameW
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
lstrcmpA
GlobalAlloc
FormatMessageA
MulDiv
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
LoadLibraryA
SetLastError
lstrcmpW
GetProcAddress
GlobalLock
GlobalUnlock
GlobalFree
LocalFree
CompareStringA
CompareStringW
GetVersion
InterlockedExchange
FreeResource
CreateThread
lstrcpyW
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
IsDBCSLeadByte
lstrcmpiA
LoadLibraryExA
FreeLibrary
RaiseException
GetModuleHandleA
InterlockedDecrement
InterlockedIncrement
InitializeCriticalSection
CreateProcessA
WaitForSingleObject
GetTickCount
GetVersionExA
DeleteFileA
CloseHandle
GetTempPathA
GetTempFileNameA
GetLastError
GetSystemDirectoryA
lstrlenA
MultiByteToWideChar
lstrlenW
GetModuleFileNameA
LoadResource
LockResource
SizeofResource
FindResourceA
WideCharToMultiByte
Sleep
VirtualProtect
GetWindowThreadProcessId
UnregisterClassA
GetSysColorBrush
GetMessageA
TranslateMessage
ValidateRect
PostQuitMessage
GetWindowDC
ReleaseDC
GetDC
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
MoveWindow
SetWindowTextA
IsDialogMessageA
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
ModifyMenuA
GetMenuState
EnableMenuItem
CheckMenuItem
RegisterWindowMessageA
LoadIconA
SendDlgItemMessageA
WinHelpA
GetCapture
SetWindowsHookExA
CallNextHookEx
SetPropA
GetPropA
RemovePropA
SetFocus
GetWindowTextLengthA
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
MapWindowPoints
GetKeyState
SetForegroundWindow
GetMenu
GetMenuItemID
GetMenuItemCount
MessageBoxA
GetClassInfoExA
GetDlgCtrlID
CallWindowProcA
SetWindowPos
SystemParametersInfoA
SetTimer
GetWindowRect
PostMessageA
IsWindowVisible
KillTimer
EnableWindow
IsIconic
GetWindowPlacement
GetDesktopWindow
GetActiveWindow
SetActiveWindow
GetSystemMetrics
CreateDialogIndirectParamA
GetDlgItem
IsWindowEnabled
GetParent
GetNextDlgTabItem
EndDialog
GetCursorPos
PtInRect
GetClassLongA
SetClassLongA
AdjustWindowRectEx
CharUpperA
GetSysColor
RedrawWindow
UpdateWindow
InvalidateRect
SetCursor
LoadCursorA
CharNextA
DispatchMessageA
PeekMessageA
GetAsyncKeyState
IsWindow
CharUpperBuffA
ShowWindow
DestroyWindow
GetClientRect
GetWindow
GetFocus
SendMessageA
LoadBitmapA
DefWindowProcA
GetClassNameA
EnumChildWindows
EnumWindows
LoadMenuA
GetSubMenu
TrackPopupMenu
DestroyMenu
GetClassInfoA
RegisterClassA
CreateWindowExA
CopyRect
BeginPaint
EndPaint
SetWindowLongA
GetWindowLongA
DeleteDC
GetMapMode
GetDeviceCaps
CreateBitmap
SetBkColor
SetTextColor
GetClipBox
DeleteObject
CreateSolidBrush
GetStockObject
GetObjectA
CreateFontIndirectA
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetWindowExtEx
GetViewportExtEx
MoveToEx
LineTo
SetMapMode
SetBkMode
RestoreDC
SaveDC
GetFileTitleA
OpenPrinterA
DocumentPropertiesA
ClosePrinter
RegQueryInfoKeyA
RegEnumKeyExA
RegCreateKeyA
RegSetValueExA
RegCreateKeyExA
RegOpenKeyExA
RegCloseKey
RegOpenKeyA
RegEnumKeyA
RegQueryValueExA
RegDeleteKeyA
RegDeleteValueA
RegQueryValueA
ShellExecuteA
CLSIDFromString
CoTaskMemAlloc
StringFromCLSID
CoTaskMemFree
CoTaskMemRealloc
StringFromGUID2
CoCreateInstance
CoCreateGuid
SysFreeString
VarUI4FromStr
UnRegisterTypeLi
SysAllocString
LoadTypeLi
SysStringLen
VariantClear
VariantCopy
VariantInit
SysAllocStringByteLen
VarBstrCmp
VariantChangeType
OleLoadPicture
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ