DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
b52d0528a03ed6c2439e957082c4d39f_JaffaCakes118.dll
Resource
win7-20240708-en
Target
b52d0528a03ed6c2439e957082c4d39f_JaffaCakes118
Size
180KB
MD5
b52d0528a03ed6c2439e957082c4d39f
SHA1
bc23fe97d7668de420957856a0938112c804bcaa
SHA256
16fe646b35c830a53abc4ce7321ca3121f2e5bb4c8bb47de0abf7837eb84104c
SHA512
25ece0f3ecf156d15ed953d31ad194041869c4e6a356d01ff1b928a48b92213c97f049cbaca963585c0c15f417584e8915ee2041371152646c0324215b6c3f59
SSDEEP
3072:N+4xqI+GY5RvvOOnI7BJyqS6QECF2lKpZT1+iGn9DjlN8T:JxAlv5mJyqSSCFzZxW7
Checks for missing Authenticode signature.
resource |
---|
b52d0528a03ed6c2439e957082c4d39f_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
lstrlenA
CompareStringA
CompareStringW
DeleteFileA
CloseHandle
ReadFile
GetFileSize
CreateFileA
CreateProcessA
LocalFree
FormatMessageA
MoveFileA
GetSystemDirectoryA
HeapFree
GetProcessHeap
SetLastError
GlobalUnlock
GlobalLock
GlobalAlloc
EnterCriticalSection
LeaveCriticalSection
MulDiv
HeapAlloc
FlushInstructionCache
GetCurrentProcess
lstrcmpA
GetModuleFileNameA
GetCurrentThreadId
InterlockedIncrement
InterlockedDecrement
lstrcpynA
lstrcpyA
lstrcatA
IsDBCSLeadByte
FreeLibrary
LoadLibraryExA
GetModuleHandleA
DisableThreadLibraryCalls
CreateThread
GetLastError
RaiseException
SetEnvironmentVariableA
WideCharToMultiByte
LoadLibraryA
SetFilePointer
IsBadCodePtr
IsBadReadPtr
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
WriteFile
UnhandledExceptionFilter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
LCMapStringW
LCMapStringA
GetTimeZoneInformation
GetStringTypeW
GetStringTypeA
TlsGetValue
TlsSetValue
TlsFree
TlsAlloc
GetCPInfo
GetOEMCP
SetUnhandledExceptionFilter
TerminateProcess
GetProcAddress
IsBadWritePtr
VirtualFree
HeapCreate
ExitProcess
GetCommandLineA
GetSystemTimeAsFileTime
RtlUnwind
VirtualQuery
GetSystemInfo
VirtualAlloc
VirtualProtect
HeapSize
MultiByteToWideChar
HeapReAlloc
HeapDestroy
lstrcmpiA
lstrlenW
FindResourceExA
FindResourceA
LoadResource
LockResource
SizeofResource
DeleteCriticalSection
SetStdHandle
InitializeCriticalSection
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
FlushFileBuffers
InterlockedExchange
UnregisterClassA
EndDialog
MoveWindow
IsDlgButtonChecked
GetDlgItem
SetRect
DestroyWindow
CheckDlgButton
IsChild
SetWindowLongA
GetWindowTextA
GetWindowTextLengthA
SetWindowPos
SetWindowContextHelpId
MapDialogRect
GetWindow
CreateWindowExA
EnumChildWindows
EnumThreadWindows
SystemParametersInfoA
CopyRect
wsprintfA
CreateAcceleratorTableA
CharNextA
GetParent
GetClassNameA
RedrawWindow
IsWindow
SendMessageA
GetFocus
SetFocus
BeginPaint
EndPaint
GetSysColor
CallWindowProcA
GetDesktopWindow
InvalidateRgn
InvalidateRect
ReleaseDC
GetDC
GetClientRect
FillRect
SetCapture
ReleaseCapture
DestroyAcceleratorTable
GetWindowLongA
SetWindowTextA
DefWindowProcA
RegisterWindowMessageA
GetClassInfoExA
LoadCursorA
RegisterClassExA
GetStockObject
GetObjectA
GetDeviceCaps
BitBlt
CreateCompatibleDC
CreateCompatibleBitmap
DeleteDC
SelectObject
DeleteObject
CreateSolidBrush
RegCreateKeyExA
RegCloseKey
RegDeleteValueA
RegDeleteKeyA
RegSetValueExA
RegOpenKeyExA
RegQueryInfoKeyA
RegEnumKeyExA
CoTaskMemRealloc
CoTaskMemFree
CreateStreamOnHGlobal
OleInitialize
OleUninitialize
StringFromGUID2
CoTaskMemAlloc
OleLockRunning
CoGetClassObject
CLSIDFromProgID
CLSIDFromString
CoCreateInstance
SysAllocStringByteLen
VariantChangeType
VarUI4FromStr
RegisterTypeLi
UnRegisterTypeLi
LoadTypeLi
LoadRegTypeLi
VariantInit
VariantClear
OleCreateFontIndirect
SysStringByteLen
SysStringLen
SysFreeString
SysAllocString
SysAllocStringLen
SHSetValueA
SHGetValueA
SHDeleteKeyA
PathFindExtensionA
URLDownloadToFileA
InternetOpenA
InternetOpenUrlA
InternetReadFile
InternetCloseHandle
GetUrlCacheEntryInfoA
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ