DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Register
Uninstall
Static task
static1
Behavioral task
behavioral1
Sample
a512c8b8d1fc072ffcb0a6ee3af10470_JaffaCakes118.dll
Resource
win7-20240704-en
Target
a512c8b8d1fc072ffcb0a6ee3af10470_JaffaCakes118
Size
252KB
MD5
a512c8b8d1fc072ffcb0a6ee3af10470
SHA1
0a36c8f9be75b9f98007bec3e212055d5e8dbf61
SHA256
bbc832477f8ebbb74ed7fbf386693a9ea18fd114f3267712c68457d30678d992
SHA512
9b87a0c241e6961f015d80778cb9787272ca07b6140b4494bf2c9be5f49bce54fa2efb39933d193a0df21baa95612696e871e33b8a1ac2de13083ee26a1db872
SSDEEP
6144:5XXLOBMC5GtDS/f9tePyugo5QnjQTEwKY/:5GMtDiKY8TIE
Checks for missing Authenticode signature.
resource |
---|
a512c8b8d1fc072ffcb0a6ee3af10470_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PathFindExtensionA
PathIsUNCA
PathFindFileNameA
SHDeleteKeyA
SHSetValueA
SHGetValueA
PathRemoveFileSpecA
PathRemoveExtensionA
SHDeleteValueA
PathFileExistsA
PathAppendA
PathStripToRootA
StrStrIA
PathRemoveBackslashA
PathRemoveBlanksA
SHGetValueW
Sleep
SetThreadPriority
LoadLibraryA
InitializeCriticalSection
DeleteCriticalSection
MapViewOfFile
CreateFileMappingA
OpenFileMappingA
UnmapViewOfFile
LeaveCriticalSection
CreateThread
ReadFile
GetFileSize
CreateFileA
GetShortPathNameA
GetLongPathNameA
GetSystemDirectoryA
GetWindowsDirectoryA
GetVersionExA
GetTickCount
GetTempPathA
FindClose
FindNextFileA
FindFirstFileA
OpenMutexA
CreateMutexA
lstrlenW
lstrcpynW
lstrlenA
lstrcpynA
MultiByteToWideChar
WaitForSingleObject
TerminateThread
WideCharToMultiByte
CreateToolhelp32Snapshot
GetModuleFileNameW
LoadLibraryW
GetModuleHandleW
OutputDebugStringA
GetFileAttributesW
GetLastError
LoadLibraryExA
SetLastError
GetModuleFileNameA
lstrcpyA
CopyFileA
ReadProcessMemory
FreeLibrary
DeleteFileA
VirtualQuery
lstrcmpiA
VirtualProtect
WriteProcessMemory
GetCurrentProcessId
Module32First
Module32Next
CloseHandle
GetModuleHandleA
GetCurrentProcess
FlushInstructionCache
GetSystemInfo
GetProcAddress
GetVersion
InterlockedIncrement
InterlockedDecrement
InterlockedExchange
EnterCriticalSection
LocalFree
DosDateTimeToFileTime
LocalFileTimeToFileTime
SetFileTime
lstrcmpA
lstrcatA
IsBadStringPtrA
GlobalLock
GlobalSize
HeapFree
HeapAlloc
GetProcessHeap
IsDebuggerPresent
GetACP
CreateProcessA
GetPrivateProfileStructA
WritePrivateProfileStructA
WriteFile
MoveFileExA
WritePrivateProfileStringA
GetPrivateProfileIntA
DeviceIoControl
WritePrivateProfileSectionA
GetPrivateProfileStringA
GetCurrentThreadId
IsBadReadPtr
IsBadStringPtrW
TlsAlloc
TlsFree
TlsSetValue
TlsGetValue
SizeofResource
LockResource
LoadResource
FindResourceA
SetFileAttributesA
GetDlgItemTextA
FindWindowExA
MessageBoxA
SetWindowsHookExA
InvalidateRect
IsWindowUnicode
GetWindowLongW
CallWindowProcA
SetWindowLongW
GetWindowTextA
IsWindowVisible
PostMessageA
GetSysColor
UnhookWindowsHookEx
ReleaseDC
DrawTextA
FillRect
GetDC
GetFocus
CallNextHookEx
GetKeyState
ShowWindow
SetPropA
RemovePropA
GetComboBoxInfo
DrawFocusRect
GetSystemMetrics
LoadIconA
RegisterWindowMessageA
GetClassNameA
SendMessageA
SetWindowTextA
IsWindow
GetParent
EnumWindows
GetWindowThreadProcessId
SendMessageTimeoutA
DialogBoxParamA
GetWindowLongA
GetWindow
GetWindowRect
SystemParametersInfoA
GetClientRect
MapWindowPoints
SetWindowPos
EnumChildWindows
EndDialog
GetWindowTextLengthA
GetDlgItem
EnableWindow
DefWindowProcA
LoadStringA
OpenSCManagerA
CloseServiceHandle
RegOpenKeyExW
RegQueryValueExW
RegSetValueExW
ControlService
StartServiceA
QueryServiceStatus
OpenServiceA
DeleteService
GetLengthSid
InitializeAcl
AddAccessAllowedAce
RegOpenKeyExA
RegQueryValueExA
RegDeleteValueA
RegCreateKeyExA
RegSetValueA
RegCreateKeyA
RegSetValueExA
RegOpenKeyA
RegCloseKey
CreateServiceA
SetSecurityDescriptorDacl
AllocateAndInitializeSid
InitializeSecurityDescriptor
SetSecurityDescriptorOwner
RegSetKeySecurity
FreeSid
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
CoCreateInstance
RegisterDragDrop
RevokeDragDrop
OleRun
CoCreateGuid
ReleaseStgMedium
CoInitialize
OleUninitialize
OleInitialize
CoTaskMemFree
StringFromCLSID
CoUninitialize
SysFreeString
VariantClear
SysAllocString
ImageDirectoryEntryToData
strrchr
strchr
fread
ftell
malloc
tmpnam
_wcsicmp
_strnicmp
strncpy
_stricmp
_mbstok
_ltoa
atol
_mbslen
??1type_info@@UAE@XZ
_open
_read
_write
_close
_lseek
__dllonexit
_onexit
_initterm
_adjust_fdiv
wcslen
rewind
strstr
fputs
fseek
time
srand
fwrite
_CxxThrowException
printf
_mbsnbcpy
_vsnprintf
atoi
_ismbcdigit
_mbclen
fopen
fgets
fclose
bsearch
_mbsrchr
free
_snprintf
realloc
_mbslwr
_mbsstr
_mbschr
_mbsnbicmp
_mbscmp
sprintf
_purecall
rand
_mbsicmp
__CxxFrameHandler
??2@YAPAXI@Z
??3@YAXPAX@Z
_except_handler3
_tempnam
_strlwr
_wcsnicmp
_itoa
IsValidURL
URLDownloadToFileA
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
recv
WSAGetLastError
setsockopt
htons
closesocket
connect
socket
WSACleanup
gethostbyname
gethostname
WSAStartup
inet_addr
send
CreatePen
MoveToEx
LineTo
SetPixel
CreateSolidBrush
GetStockObject
SelectObject
SetBkMode
GetTextAlign
SetTextAlign
SetTextColor
GetTextExtentPointA
DeleteObject
SetBkColor
ExtTextOutA
SHGetMalloc
SHGetSpecialFolderLocation
SHGetDesktopFolder
SHGetFileInfoA
SHGetSpecialFolderPathA
InternetCrackUrlA
DeleteUrlCacheEntry
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Register
Uninstall
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ