AdsTypeToLdapTypeCopyGeneralizedTime
GetDomainDNSNameForDomain
CreateProcessNotify
DllClientCleanup
SdbCloseApphelpInformation
nw16prov
DllClientStartup
Static task
static1
Behavioral task
behavioral1
Sample
b07090972f1a5c9c00239e48aea99246_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b07090972f1a5c9c00239e48aea99246_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
b07090972f1a5c9c00239e48aea99246_JaffaCakes118
Size
60KB
MD5
b07090972f1a5c9c00239e48aea99246
SHA1
4588123bc0c525343a672243a79ae2faeeeb7b37
SHA256
a9392574a6dd0cbd1b0f157b776ed4cc07c382dd2381274e71c8e8410e0d5c2c
SHA512
c28d88f424bee1309fd2d6d39a1b95d9bf6303c35089ca3af1b39ef7559ca289fe4f15fb079e3d0b48682c6e1c787332c9dfc19cff8cb2df9fdd7311ca87db70
SSDEEP
768:u5kFD1aQ5/4MGDCbkKoPHHFXtTfbszX2il/4kEYch1iPI3E4oKZzRUp8oEW3oaD1:7FDAa4gvClXtqv/4kEy0Von8oEWpYE
Checks for missing Authenticode signature.
resource |
---|
b07090972f1a5c9c00239e48aea99246_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
LoadCursorA
EmptyClipboard
GetAsyncKeyState
MessageBeep
InvalidateRect
CharLowerA
GetSysColorBrush
SetForegroundWindow
GetParent
DialogBoxParamA
CheckMenuRadioItem
SetDlgItemTextA
SetMenuItemInfoA
EndDialog
DestroyIcon
IsIconic
CloseClipboard
SetWindowPos
SetClassLongA
GetWindowDC
IsDlgButtonChecked
SendDlgItemMessageA
DestroyCursor
EnableMenuItem
TrackPopupMenu
CheckDlgButton
GetClipboardData
OpenClipboard
KillTimer
GetDlgItem
EnableWindow
SetFocus
GetWindowRect
FindWindowA
GetDlgItemTextA
CreatePopupMenu
_Strxfrm
_Nan
_FDnorm
_Strcoll
_LRteps
_Getcoll
_FSnan
_Inf
_Dtest
_FDtest
_LExp
_Cosh
_LPoly
_FExp
_LNan
_Mbrtowc
_FNan
_LXbig
_Rteps
_FSinh
_Getcvt
_Toupper
_Denorm
_Exp
_Stod
_FEps
_LSinh
_Dnorm
GetProcAddress
GetTempPathA
VirtualFree
TerminateProcess
CopyFileA
ReadProcessMemory
GetModuleFileNameA
MulDiv
lstrlenW
CreateFileMappingA
CreateProcessA
WaitForSingleObject
WriteFile
GetComputerNameA
GlobalAlloc
GetCurrentThread
MapViewOfFile
GlobalUnlock
FindNextFileA
SetPriorityClass
ReadFile
ResumeThread
SetFileAttributesA
lstrcmpiA
CloseHandle
CreatePipe
VirtualAlloc
SetThreadPriority
VirtualProtectEx
VirtualQuery
WriteProcessMemory
GetStartupInfoA
FindFirstFileA
UnmapViewOfFile
SetFilePointer
WaitForMultipleObjects
WritePrivateProfileStringA
Sleep
FindClose
GetVersion
WideCharToMultiByte
SetEndOfFile
GlobalLock
LoadLibraryA
GetCurrentDirectoryA
GetModuleHandleA
SetCurrentDirectoryA
GetCurrentProcessId
CreateFileA
GetPriorityClass
OpenProcess
WritePrivateProfileStructA
realloc
toupper
gmtime
sprintf
free
malloc
strchr
mktime
div
CheckSumMappedFile
ImageRvaToSection
RegCloseKey
RegCreateKeyExA
AdjustTokenPrivileges
OpenProcessToken
GetOpenFileNameA
AdsTypeToLdapTypeCopyGeneralizedTime
GetDomainDNSNameForDomain
CreateProcessNotify
DllClientCleanup
SdbCloseApphelpInformation
nw16prov
DllClientStartup
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ