DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
bac48d264e9041039abd8a6a5ebb31ee_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
bac48d264e9041039abd8a6a5ebb31ee_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
bac48d264e9041039abd8a6a5ebb31ee_JaffaCakes118
Size
263KB
MD5
bac48d264e9041039abd8a6a5ebb31ee
SHA1
cff32dc707781c1915197bdc6b105371d4c963d7
SHA256
479ed4f0b11a3c4473646284fdafdfc8b4330aa2a210d3367314e9a133d92b2c
SHA512
23239eb4569fb2faf8d6a1b7417c054da33e46770240347d4f5c74db4035dae4f9eeb5f8f0d420ba7de233210b060088f0d1cb882f5551bef43b9e7d2ced5484
SSDEEP
6144:5ODfU12CKRnbb2QavtahLQ/ewBymNjvE83q1zx8V:YDf+2CMnu7tah8BymNw83q1t8
Checks for missing Authenticode signature.
resource |
---|
bac48d264e9041039abd8a6a5ebb31ee_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
ord1165
ord826
ord269
ord1115
ord1173
ord1568
ord1570
ord1179
ord342
ord1240
ord1194
ord1563
ord1248
ord1250
ord1571
ord600
ord1129
ord1131
ord5496
ord3948
ord815
ord6371
ord4480
ord2546
ord2504
ord5727
ord3917
ord1089
ord5193
ord2388
ord3341
ord5296
ord5298
ord2717
ord4074
ord4692
ord5303
ord5285
ord5710
ord4616
ord4418
ord3733
ord561
ord4269
ord4704
ord4282
ord6375
ord6193
ord3087
ord2127
ord3000
ord5156
ord5155
ord5154
ord4970
ord5426
ord4899
ord4736
ord6330
ord4352
ord825
ord2859
ord3133
ord4253
ord818
ord4942
ord5261
ord4371
ord4848
ord4992
ord2506
ord6048
ord4073
ord1767
ord4401
ord5237
ord2377
ord5157
ord6370
ord4347
ord5283
ord3793
ord4829
ord4435
ord2640
ord2047
ord6372
ord3744
ord5059
ord1720
ord5257
ord2438
ord2116
ord5273
ord2977
ord3142
ord3254
ord4459
ord3131
ord3257
ord2980
ord3076
ord2971
ord3825
ord3826
ord3820
ord3074
ord4075
ord4621
ord4419
ord489
ord567
ord768
ord1899
ord6466
ord823
ord2385
ord1258
ord1262
BuildSecurityDescriptorW
GetAce
DeleteAce
InitializeAcl
AddAce
GetAclInformation
MakeSelfRelativeSD
EqualSid
RegQueryInfoKeyW
RegSetValueExW
RegOpenKeyExW
RegCreateKeyExW
RegCloseKey
RegDeleteValueW
GetSecurityDescriptorControl
MakeAbsoluteSD
GetSecurityDescriptorOwner
SetSecurityDescriptorOwner
GetSecurityDescriptorGroup
SetSecurityDescriptorGroup
GetSecurityDescriptorDacl
SetSecurityDescriptorDacl
GetSecurityDescriptorSacl
SetSecurityDescriptorSacl
SetSecurityDescriptorControl
ConvertStringSecurityDescriptorToSecurityDescriptorW
ConvertSecurityDescriptorToStringSecurityDescriptorW
MapGenericMask
RegEnumKeyExW
GetDeviceCaps
CreateRectRgnIndirect
CreateDCW
RestoreDC
DeleteDC
SetViewportOrgEx
SetWindowOrgEx
SetMapMode
GetClipRgn
CreateRectRgn
SelectClipRgn
Rectangle
SetTextAlign
TextOutW
SaveDC
LPtoDP
DeleteObject
InitializeCriticalSection
DeleteCriticalSection
GetModuleHandleA
GetModuleHandleW
GetProcAddress
GetFileAttributesW
GetVersion
lstrlenW
GetLastError
SetLastError
RaiseException
EnterCriticalSection
LeaveCriticalSection
FlushInstructionCache
GetCurrentProcess
LoadLibraryW
GetModuleFileNameW
OutputDebugStringA
GetCurrentThreadId
InterlockedIncrement
InterlockedDecrement
FreeLibrary
LoadLibraryA
GlobalFree
GlobalAlloc
LocalFree
LocalAlloc
lstrcmpiW
LoadLibraryExW
MultiByteToWideChar
SizeofResource
LoadResource
GetVersionExA
InterlockedExchange
HeapFree
FindResourceW
GetProcessHeap
HeapAlloc
VirtualFree
VirtualAlloc
Sleep
InterlockedCompareExchange
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
MulDiv
StringFromCLSID
CoTaskMemRealloc
CoTaskMemAlloc
CLSIDFromString
CLSIDFromProgID
CoCreateInstance
HWND_UserSize
HWND_UserMarshal
HWND_UserUnmarshal
HWND_UserFree
HBITMAP_UserSize
HBITMAP_UserMarshal
HBITMAP_UserUnmarshal
HBITMAP_UserFree
CoTaskMemFree
OleSaveToStream
WriteClassStm
OleRegGetMiscStatus
OleRegGetUserType
OleRegEnumVerbs
CreateOleAdviseHolder
OleLoadFromStream
CoUninitialize
CoInitialize
SysAllocStringByteLen
VarUI4FromStr
VARIANT_UserSize
VARIANT_UserMarshal
VARIANT_UserUnmarshal
VARIANT_UserFree
BSTR_UserSize
BSTR_UserMarshal
BSTR_UserUnmarshal
BSTR_UserFree
OleCreatePropertyFrame
LoadTypeLi
LoadRegTypeLi
SysStringLen
VariantChangeType
VariantClear
VariantInit
SysStringByteLen
SysFreeString
FindWindowExW
GetWindowThreadProcessId
UnhookWindowsHookEx
CallNextHookEx
SetWindowsHookExW
GetParent
SetWindowLongW
GetWindowLongW
UnregisterClassA
LoadCursorW
ReleaseDC
GetDC
SetWindowPos
SetWindowRgn
OffsetRect
EqualRect
IntersectRect
EndPaint
GetClientRect
BeginPaint
CallWindowProcW
PtInRect
UnionRect
DefWindowProcW
RegisterClassExW
GetClassInfoExW
CreateWindowExW
SetFocus
IsChild
GetFocus
ShowWindow
DestroyWindow
IsWindow
InvalidateRect
GetKeyState
GetWindowRect
ScreenToClient
EnableWindow
SendMessageW
PostMessageW
GetDlgItem
CharNextW
ord1
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ