RunDllEntry
runDll
Static task
static1
Behavioral task
behavioral1
Sample
b42296359ebcd003e3064fe33ba4eec7_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b42296359ebcd003e3064fe33ba4eec7_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
b42296359ebcd003e3064fe33ba4eec7_JaffaCakes118
Size
405KB
MD5
b42296359ebcd003e3064fe33ba4eec7
SHA1
84365f6e1ef0603e6975df27e92a840e2f96b1d0
SHA256
c4e2e341689799281eaef47de75f59edceaba281398b41fe7616436f247ab93d
SHA512
392cdc151e2684fedde79d5598f0b89aa8f6442322c0f1a1caa4f03ab8ed058b37c2cf1b4affa7f450b4c9db1db1c45847b7828f53250108d801341f09240a6d
SSDEEP
6144:NtWLXS1+0YUv+JfXUZkc7n1IWGWE0IhH6O5RUdAQ:NyXS1+BUWJf+j7n1LshH+
Checks for missing Authenticode signature.
resource |
---|
b42296359ebcd003e3064fe33ba4eec7_JaffaCakes118 |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
HeapFree
GetProcessHeap
GetLastError
ResumeThread
WaitForSingleObject
GetModuleHandleW
GetModuleHandleExW
GetProcAddress
GetModuleFileNameW
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
CopyFileW
GetEnvironmentVariableW
GetTempFileNameW
FormatMessageA
LocalFree
CloseHandle
WaitNamedPipeW
CreateNamedPipeW
ConnectNamedPipe
CreateFileW
ReadFile
WriteFile
FreeLibrary
LoadLibraryW
VirtualAllocEx
WriteProcessMemory
lstrlenA
HeapAlloc
LoadLibraryA
InterlockedIncrement
InterlockedDecrement
WideCharToMultiByte
InterlockedCompareExchange
InterlockedExchange
MultiByteToWideChar
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
SetEndOfFile
FindNextFileW
GetVersion
SetLastError
GetModuleHandleA
AreFileApisANSI
TerminateProcess
FindClose
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCurrentThreadId
GetCommandLineA
GetSystemTimeAsFileTime
ExitProcess
RaiseException
RtlUnwind
GetStringTypeW
GetCPInfo
LCMapStringA
LCMapStringW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapCreate
HeapDestroy
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
VirtualAlloc
HeapReAlloc
GetConsoleCP
GetConsoleMode
SetFilePointer
FlushFileBuffers
GetACP
GetOEMCP
IsValidCodePage
InitializeCriticalSectionAndSpinCount
HeapSize
GetTimeFormatA
GetDateFormatA
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetStringTypeA
GetLocaleInfoW
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetStdHandle
CreateFileA
GetTimeZoneInformation
CompareStringA
CompareStringW
SetEnvironmentVariableA
FindFirstFileW
GetCurrentProcess
DeleteFileW
CreateRemoteThread
CreateThread
Sleep
OpenProcess
InternetErrorDlg
InternetSetOptionW
InternetQueryOptionW
HttpQueryInfoW
InternetReadFile
HttpSendRequestW
HttpOpenRequestW
InternetConnectW
InternetOpenW
InternetCloseHandle
CryptStringToBinaryA
CryptBinaryToStringA
PostMessageW
GetParent
EnumWindows
CreateWindowExW
DestroyWindow
RegCloseKey
RegQueryValueExW
RegSetValueExW
RegDeleteValueW
RegCreateKeyExW
CoCreateGuid
RunDllEntry
runDll
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ