DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
b29c2634f80ea6064cf09f3564ba07b6_JaffaCakes118.dll
Resource
win7-20240708-en
Target
b29c2634f80ea6064cf09f3564ba07b6_JaffaCakes118
Size
350KB
MD5
b29c2634f80ea6064cf09f3564ba07b6
SHA1
2005e00f9d23352911d5acb248ad498a8e465138
SHA256
f3f3d3a48d60671db84662b121312d3589c8e8e5b464118c13d4a7de713dd56d
SHA512
f2aab00039dc46d8da79347310337ed30f4841d1a25971c4d878a562075aba45c84dd4fd9829f3cc02f6597bb55e7fcc3d1eed20c7a9facfb62aaa6489f9694b
SSDEEP
6144:27ixEmRna8KUh26IH/OfZSa4BudrUw45Od+B2uAeIBzL59/KBTA/:2WxEUKUQ6IH2QaJ8JtBTA
Checks for missing Authenticode signature.
resource |
---|
b29c2634f80ea6064cf09f3564ba07b6_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
SizeofResource
LoadResource
LockResource
CreateFileW
WriteFile
CloseHandle
CreateThread
lstrcmpiW
MultiByteToWideChar
GetModuleHandleW
RaiseException
GetModuleFileNameW
InterlockedIncrement
InterlockedDecrement
GetThreadLocale
FreeLibrary
FindResourceExW
WinExec
OpenProcess
lstrlenA
LoadLibraryW
FindResourceW
LoadLibraryExW
GetTickCount
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
GetLastError
lstrlenW
SetThreadLocale
WideCharToMultiByte
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
LoadLibraryA
ExitProcess
HeapSize
Sleep
SetLastError
TlsFree
TlsSetValue
TlsAlloc
GetStdHandle
TlsGetValue
GetModuleHandleA
GetProcAddress
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
GetProcessHeap
GetVersionExA
GetCommandLineA
GetCurrentThreadId
GetSystemTimeAsFileTime
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
HeapAlloc
InterlockedExchange
RtlUnwind
GetCurrentProcessId
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
SetHandleCount
GetOEMCP
GetACP
GetCPInfo
GetModuleFileNameA
HeapReAlloc
HeapFree
EnumWindows
CharNextW
MessageBoxW
CharLowerA
CharLowerW
GetWindowThreadProcessId
PostMessageW
UnregisterClassA
IsTextUnicode
RegDeleteValueW
RegCreateKeyExW
RegSetValueExW
RegOpenKeyExW
RegEnumKeyExW
RegQueryInfoKeyW
RegCloseKey
RegDeleteKeyW
RegQueryValueExW
SHGetFolderPathW
CoTaskMemFree
CoTaskMemRealloc
CoTaskMemAlloc
CoGetClassObject
StringFromGUID2
CoCreateInstance
LoadRegTypeLi
RegisterTypeLi
VariantClear
SysAllocStringLen
SysFreeString
VarUI4FromStr
SysAllocString
SysStringByteLen
SysAllocStringByteLen
VarBstrCmp
SysStringLen
LoadTypeLi
VarBstrCat
UnRegisterTypeLi
NdrOleFree
NdrStubForwardingFunction
NdrOleAllocate
NdrDllRegisterProxy
NdrDllCanUnloadNow
IUnknown_Release_Proxy
NdrCStdStubBuffer2_Release
IUnknown_AddRef_Proxy
NdrDllGetClassObject
NdrDllUnregisterProxy
IUnknown_QueryInterface_Proxy
InternetSetCookieW
InternetGetCookieW
InternetCloseHandle
InternetReadFile
HttpSendRequestW
HttpOpenRequestW
InternetConnectW
InternetCrackUrlW
InternetOpenW
CoInternetGetSession
EnumProcesses
GetModuleBaseNameW
EnumProcessModules
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ