DirectXFileCreate
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
ba795d20dcbdef1683ec1fa6f63fe091_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ba795d20dcbdef1683ec1fa6f63fe091_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
ba795d20dcbdef1683ec1fa6f63fe091_JaffaCakes118
Size
504KB
MD5
ba795d20dcbdef1683ec1fa6f63fe091
SHA1
c27290499d5bf38737926b7882824186f61b0cd9
SHA256
33dc4f55d1eff860065d1aef6af4abb22a467ccaa3a78d70b2771b84186ca131
SHA512
b85e552f4e2eb2a3c9f1f6543324566a53e9734de4b046daa39a91ae7eb33bec8c235c6aa73afef1f8173ad7ff35c47e88f531bbd432d6e3861efc0107bd2e2c
SSDEEP
6144:1g7wEBABbPw8lg5ojOP9LdwrBuuId/LjmaL74YuNG:y0EBCbPw8lOUSze1aQYuNG
Checks for missing Authenticode signature.
resource |
---|
ba795d20dcbdef1683ec1fa6f63fe091_JaffaCakes118 |
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
CloseHandle
CreateFileA
CreateFileMappingA
DisableThreadLibraryCalls
EnumResourceNamesW
FindResourceA
FindResourceW
GetFileSize
GetModuleFileNameW
GetModuleHandleA
GetProcAddress
GetTickCount
HeapAlloc
HeapFree
HeapReAlloc
IsBadStringPtrA
LoadLibraryW
LoadResource
LockResource
MapViewOfFile
MultiByteToWideChar
SizeofResource
UnmapViewOfFile
WriteFile
_vsnprintf
__acrt_iob_func
__stdio_common_vsprintf
__stdio_common_vsscanf
_strdup
_stricmp
_strnicmp
free
fwrite
getenv
memcmp
memcpy
memmove
memset
strchr
strcmp
strcpy
strcspn
strlen
DirectXFileCreate
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ