DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
b523453e41abd4584ed684f42cbd1a13_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b523453e41abd4584ed684f42cbd1a13_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
b523453e41abd4584ed684f42cbd1a13_JaffaCakes118
Size
57KB
MD5
b523453e41abd4584ed684f42cbd1a13
SHA1
2ab31cc62dd12fbe7a10e26b068c299543361528
SHA256
66350b69ec60f6e499218a8c1224ffa09a86f0992fa995f6dd73e5f9f7d0dbf4
SHA512
21f562ef9259ad1d9c27586b138cdf3c084e06be27d9ff7005d2809817ce1f1b2de20d10cb5ef0ad370c1c94819313678fd9c22d909281c23427fe9999f28ea4
SSDEEP
1536:njC1Ki2WkmxP+pIlB3Gj4S2Jq5o2i7zyK:n2/wOB34iJq5o2i7z5
Checks for missing Authenticode signature.
resource |
---|
b523453e41abd4584ed684f42cbd1a13_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
InternetSetCookieA
GetFileVersionInfoSizeA
VerQueryValueA
GetFileVersionInfoA
WSAStartup
WSACleanup
ord826
ord600
ord1578
ord1255
ord1253
ord1570
ord1131
ord2725
ord3953
ord561
ord3738
ord4424
ord4622
ord4080
ord3079
ord3825
ord3831
ord3830
ord2976
ord3081
ord2985
ord3262
ord3136
ord4465
ord3259
ord3147
ord2982
ord1116
ord5714
ord5289
ord5307
ord4698
ord4079
ord5302
ord5300
ord3346
ord2396
ord5199
ord1089
ord3922
ord5731
ord2512
ord2554
ord4486
ord6375
ord815
ord4274
ord537
ord6877
ord1601
ord6467
ord823
ord540
ord800
ord860
ord825
ord1197
ord1243
ord342
ord1182
ord1577
ord1168
ord1575
ord1176
ord269
__CxxFrameHandler
strrchr
_itoa
strstr
free
??1type_info@@UAE@XZ
_adjust_fdiv
_initterm
_onexit
__dllonexit
?terminate@@YAXXZ
_except_handler3
realloc
_purecall
strncpy
atoi
_strtime
_strdate
fopen
fprintf
fclose
sprintf
malloc
wcslen
InterlockedIncrement
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
HeapDestroy
InitializeCriticalSection
GetModuleFileNameA
GetProcessHeap
HeapAlloc
CreateEventA
CopyFileA
Sleep
ResetEvent
WaitForSingleObject
InterlockedDecrement
GetModuleHandleA
GetProcAddress
GetSystemDirectoryA
GetWindowsDirectoryA
CreateFileA
GetLastError
CloseHandle
MoveFileExA
GetEnvironmentVariableA
WritePrivateProfileStringA
GetVersionExA
GetPrivateProfileStringA
WideCharToMultiByte
lstrlenW
MultiByteToWideChar
lstrlenA
GetShortPathNameA
FreeLibrary
SizeofResource
LoadResource
FindResourceA
LoadLibraryExA
lstrcmpiA
lstrcpynA
IsDBCSLeadByte
LoadLibraryA
lstrcpyA
lstrcatA
LocalFree
CreateProcessA
DeleteFileA
LocalAlloc
PostMessageA
wsprintfA
CharNextA
FindWindowA
MessageBoxA
RegQueryInfoKeyA
RegEnumKeyExA
RegCreateKeyExA
AllocateAndInitializeSid
GetLengthSid
InitializeAcl
AddAccessAllowedAce
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
RegSetValueExA
RegDeleteValueA
RegFlushKey
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
RegDeleteKeyA
RegEnumValueA
ShellExecuteA
CoCreateInstance
CoTaskMemRealloc
CoTaskMemAlloc
CoCreateGuid
CoTaskMemFree
LoadRegTypeLi
SysStringLen
RegisterTypeLi
LoadTypeLi
SysAllocString
VarUI4FromStr
SysFreeString
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ