DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
aa452ecc0b7d978536f1563d4cd27987_JaffaCakes118.dll
Resource
win7-20240708-en
Target
aa452ecc0b7d978536f1563d4cd27987_JaffaCakes118
Size
342KB
MD5
aa452ecc0b7d978536f1563d4cd27987
SHA1
8f7b4955b487bc7090fa35d96baef989ddd24b6c
SHA256
61f24abb1db6c93b6c0635178d054274c1906bd7ee24a931a43f753f2f0024f1
SHA512
21d9bf9c181d191081feeaf7fb230669ab5b1fbf06f0e4bff90dc7397f79db73ed4112521506874d72770bf8f91dd369c4eae9f783b90e5a2b265e8c2928a96f
SSDEEP
6144:67lAL/96vvsQlItx/wpbb1IvAyn/G1MJmEVZTBngEKU1xs:Ms/8vU4I7wpbb12ucmKZT1gEjm
Checks for missing Authenticode signature.
resource |
---|
aa452ecc0b7d978536f1563d4cd27987_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
StrCmpIW
UrlEscapeW
UrlGetPartW
PathMatchSpecW
StrStrIW
UrlUnescapeW
SetEndOfFile
CreateFileA
GetModuleHandleA
GetTimeZoneInformation
SetStdHandle
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
GetModuleFileNameA
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
HeapReAlloc
VirtualAlloc
VirtualFree
HeapDestroy
HeapCreate
InitializeCriticalSectionAndSpinCount
GetStringTypeW
GetStringTypeA
GetLocaleInfoA
ExitProcess
HeapSize
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetCurrentDirectoryA
SetFilePointer
GetDateFormatA
GetTimeFormatA
FlushFileBuffers
GetConsoleMode
GetConsoleCP
ReadFile
IsValidCodePage
GetOEMCP
GetProcessHeap
GetCurrentProcessId
QueryPerformanceCounter
GetLastError
GetFullPathNameW
GetTempFileNameW
GetFileSize
MapViewOfFile
UnmapViewOfFile
VirtualQuery
CreateFileW
LocalAlloc
CreateFileMappingW
CloseHandle
LocalFree
WaitForSingleObject
TerminateThread
Sleep
SetThreadPriority
GetExitCodeThread
FreeLibrary
WriteFile
GetProcAddress
LoadLibraryA
DeleteFileW
WideCharToMultiByte
lstrlenW
SetLastError
GetTempPathW
GetSystemInfo
GetWindowsDirectoryW
GetVolumeInformationW
CreateMutexW
CreateProcessW
GetTickCount
ReleaseMutex
GetSystemTime
MoveFileExW
GetModuleHandleW
GetDriveTypeA
CompareStringA
CompareStringW
GetModuleFileNameW
MultiByteToWideChar
lstrcmpW
DeleteCriticalSection
InitializeCriticalSection
HeapAlloc
GetCPInfo
GetEnvironmentStringsW
LCMapStringW
LCMapStringA
LeaveCriticalSection
EnterCriticalSection
InterlockedDecrement
InterlockedIncrement
FreeEnvironmentStringsA
GetEnvironmentStrings
GetACP
SetEnvironmentVariableA
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapFree
GetCurrentThreadId
GetCommandLineA
GetSystemTimeAsFileTime
ExitThread
CreateThread
FindClose
FileTimeToSystemTime
FileTimeToLocalFileTime
GetDriveTypeW
FindFirstFileW
RaiseException
RtlUnwind
FreeEnvironmentStringsW
wsprintfW
EnumChildWindows
RealGetWindowClassW
GetWindowTextW
SendMessageW
SetWindowLongW
CallWindowProcW
GetWindowLongW
SetWindowTextW
SetWindowPos
CoCreateInstance
CoUninitialize
CoTaskMemFree
CoInitialize
VariantCopy
SysAllocStringLen
SysFreeString
SysAllocString
SysStringByteLen
SysAllocStringByteLen
VariantInit
VariantClear
SafeArrayCreateVector
SafeArrayPutElement
SafeArrayDestroy
VariantChangeType
inet_addr
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
UuidToStringW
RpcStringFreeW
UrlMkGetSessionOption
InternetSetOptionW
InternetOpenW
InternetQueryOptionW
InternetCrackUrlW
InternetReadFile
HttpSendRequestW
InternetConnectW
HttpQueryInfoW
InternetCloseHandle
HttpOpenRequestW
UnMapAndLoad
MapAndLoad
CryptGetHashParam
CryptDestroyHash
CryptDecrypt
CryptDestroyKey
CryptCreateHash
CryptEncrypt
CryptDeriveKey
RegSetValueExW
RegCloseKey
RegDeleteValueW
RegDeleteKeyW
RegQueryValueExW
RegCreateKeyW
CryptGenRandom
CryptReleaseContext
CryptAcquireContextW
CryptHashData
SHCreateDirectoryExW
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ