DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
GetClientTicket
Static task
static1
Behavioral task
behavioral1
Sample
b7213d010d4af56e9e4148355edba408_JaffaCakes118.dll
Resource
win7-20240708-en
Target
b7213d010d4af56e9e4148355edba408_JaffaCakes118
Size
142KB
MD5
b7213d010d4af56e9e4148355edba408
SHA1
9e075acbeb79a4e2b3d927bce0283e0ea88699ed
SHA256
5141868df9e5d5851892e1b3b16fb4d4350c7c32a5a571c69d54ce5ad7cc2c80
SHA512
c8077c62aa34d038e694630daf70223c5f34a50c035788bffdb4fa8a3fa3218c33f4ce31d33432f2e45de2d264b3611a2d519b584cf98b025cf57f6e810e937c
SSDEEP
1536:wA2D7PJjH/9Fa9i7uDxJU4exSVhqZ2dCcN2Zy14noN6dB507GpNJjUa:c7RHWV97hm28jy6oN6dB5RTJZ
Checks for missing Authenticode signature.
resource |
---|
b7213d010d4af56e9e4148355edba408_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
HttpSendRequestA
HttpQueryInfoA
InternetReadFile
InternetCloseHandle
InternetCrackUrlA
InternetSetCookieA
InternetGetConnectedState
InternetOpenA
InternetConnectA
HttpOpenRequestA
StrStrIA
PathFileExistsA
wnsprintfA
GetModuleHandleA
InterlockedIncrement
InterlockedDecrement
MultiByteToWideChar
WideCharToMultiByte
EnterCriticalSection
LeaveCriticalSection
GetLastError
GetProcAddress
lstrlenA
lstrlenW
GetModuleHandleW
SetThreadLocale
GetThreadLocale
lstrcmpiA
IsDBCSLeadByte
FreeLibrary
SizeofResource
LoadResource
FindResourceA
LoadLibraryExA
HeapReAlloc
HeapAlloc
TerminateThread
GetModuleFileNameA
GetProcessHeap
CloseHandle
LocalFree
LoadLibraryA
GetCurrentProcess
CreateProcessA
WriteFile
CreateFileA
GetTempPathA
lstrcmpA
SleepEx
ReleaseMutex
WaitForSingleObject
CreateMutexA
Sleep
CreateThread
GetVolumeInformationA
GetComputerNameA
GetSystemTimeAsFileTime
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
InitializeCriticalSection
RaiseException
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
HeapFree
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
SetHandleCount
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
GetStdHandle
HeapDestroy
HeapCreate
VirtualFree
ExitProcess
RtlUnwind
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
GetCurrentThreadId
GetCommandLineA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapSize
CharNextA
CharNextW
RegCreateKeyA
RegOpenKeyA
LookupAccountNameA
ConvertSidToStringSidA
RegQueryValueExA
OpenProcessToken
DuplicateTokenEx
ConvertStringSidToSidW
GetLengthSid
SetTokenInformation
RegEnumKeyExA
RegSetValueExA
RegCreateKeyExA
RegDeleteValueA
RegQueryInfoKeyA
RegOpenKeyExA
RegCloseKey
RegDeleteKeyA
CoTaskMemAlloc
CoTaskMemRealloc
CoTaskMemFree
CoCreateInstance
StringFromGUID2
LoadRegTypeLi
VarUI4FromStr
SysAllocStringLen
VariantClear
VariantInit
RegisterTypeLi
UnRegisterTypeLi
LoadTypeLi
SysAllocString
SysStringLen
SysFreeString
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
GetClientTicket
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ