DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
b6a44d8e01dddb83191d139f25f9848d_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b6a44d8e01dddb83191d139f25f9848d_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
b6a44d8e01dddb83191d139f25f9848d_JaffaCakes118
Size
108KB
MD5
b6a44d8e01dddb83191d139f25f9848d
SHA1
d43992dd8d2ab7f1f70e44e851f4ffb7078ab84c
SHA256
d56e4dc79cacba8625adbec852df8577aeb49ee491ff6a2b128c1c6100cd9c1a
SHA512
d5ae26a939ac5f3a2d06a0222064c89baccd05b8b0e7189b6996732550f85f1a35979afb3a9d6d43d4112df3193426340c989d20036aae91acfc6366d1c11ed3
SSDEEP
1536:+oQtWD8v4H3cY2EDIlgiGLrYOy9VjLUBw64UArneF:+oo34HsGDI6XLrYOy9VjwBw64UAr6
Checks for missing Authenticode signature.
resource |
---|
b6a44d8e01dddb83191d139f25f9848d_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
InternetCanonicalizeUrlA
ord4080
ord4627
ord4424
ord6740
ord700
ord800
ord686
ord6502
ord823
ord398
ord540
ord384
ord567
ord825
ord2414
ord4275
ord3876
ord5981
ord6199
ord939
ord858
ord4129
ord5710
ord3439
ord4202
ord535
ord3874
ord537
ord2614
ord2096
ord2379
ord6467
ord6705
ord6784
ord2915
ord3317
ord1200
ord5572
ord860
ord913
ord536
ord926
ord941
ord2859
ord4480
ord1641
ord3079
ord616
ord656
ord2864
ord2862
ord3396
ord3731
ord808
ord556
ord809
ord4269
ord1088
ord2122
ord6612
ord2121
ord4299
ord3021
ord1601
ord2764
ord940
ord859
ord4274
ord815
ord6375
ord4486
ord2554
ord2512
ord5731
ord3922
ord1089
ord5199
ord2396
ord3346
ord5300
ord5302
ord4079
ord4698
ord5307
ord5289
ord5714
ord4622
ord3738
ord3825
ord3953
ord2725
ord1131
ord818
ord6662
ord6283
ord6282
ord1168
ord3831
ord3830
ord3402
ord2976
ord3081
ord2985
ord3262
ord3136
ord4465
ord3259
ord3147
ord2982
ord5277
ord2124
ord2446
ord5261
ord1727
ord5065
ord3749
ord6376
ord2055
ord2648
ord4441
ord4837
ord269
ord3798
ord5290
ord4353
ord6374
ord5163
ord2385
ord5241
ord4398
ord1776
ord4078
ord6055
ord2578
ord4218
ord2023
ord2411
ord3626
ord3571
ord3582
ord3610
ord4407
ord3663
ord1146
ord826
ord600
ord1578
ord1255
ord1116
ord1176
ord1575
ord1577
ord1182
ord342
ord1243
ord1197
ord1570
ord1253
ord561
_mbscmp
??1type_info@@UAE@XZ
_adjust_fdiv
malloc
_initterm
__CxxFrameHandler
_onexit
__dllonexit
?terminate@@YAXXZ
_except_handler3
strcpy
strlen
memcmp
_CxxThrowException
free
_purecall
rand
time
srand
memcpy
atoi
memset
sprintf
strcmp
LeaveCriticalSection
InterlockedIncrement
EnterCriticalSection
DeleteCriticalSection
LocalFree
WideCharToMultiByte
FreeLibrary
GetProcAddress
InitializeCriticalSection
InterlockedDecrement
lstrlenW
LoadLibraryA
lstrcpyW
MultiByteToWideChar
lstrlenA
LocalAlloc
GetLastError
GetKeyState
DispatchMessageA
ShowWindow
TranslateMessage
GetFocus
GetClientRect
EnableWindow
LoadBitmapA
GetDC
ReleaseDC
SendMessageA
SetPixel
RegQueryInfoKeyA
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
RegCreateKeyExA
RegCloseKey
SHGetFileInfoA
ImageList_GetImageCount
ImageList_AddMasked
CoInitialize
CoUninitialize
SysAllocStringByteLen
SysStringLen
LoadRegTypeLi
VariantInit
VariantClear
SysFreeString
SysAllocString
ord10
ord30
ord23
ord16
ord21
ord15
ord18
ord32
ord58
ord57
??0_Lockit@std@@QAE@XZ
??1_Lockit@std@@QAE@XZ
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ