@WEP$qqsi
DllCanUnloadNow
DllGetClassObject
DllGetDataSnapClassObject
DllRegisterServer
DllUnregisterServer
ExitAlchemy
InitAlchemy
___CPPdebugHook
Static task
static1
Behavioral task
behavioral1
Sample
bf54e69e3aa9bba4f9ccd888d75bf9e0_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
bf54e69e3aa9bba4f9ccd888d75bf9e0_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
bf54e69e3aa9bba4f9ccd888d75bf9e0_JaffaCakes118
Size
286KB
MD5
bf54e69e3aa9bba4f9ccd888d75bf9e0
SHA1
e372e60b659e1a5a15cd57a6f74506869508e28f
SHA256
d6e1640e585707530b3dc3a5ecb47eb0f5c01d4143b15bf0765a810e28ed45d6
SHA512
b567aff1868cd11c1613775f2fba29ea912d4993a8b4828f6feaeae4da0d6d8665163199c624fe80de39b295adbd21ea39451b37c15584085bf3ad9bebc1c1dc
SSDEEP
6144:H0gSgRBcQfo8nKs1WpoBej8cOUm5q+BZszU59FeUh:HXRBxfokX1/uu1
Checks for missing Authenticode signature.
resource |
---|
bf54e69e3aa9bba4f9ccd888d75bf9e0_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
RegCloseKey
RegCreateKeyExA
RegDeleteKeyA
RegOpenKeyExA
RegSetValueExA
CloseHandle
CompareStringA
CreateFileA
DeleteCriticalSection
EnterCriticalSection
ExitProcess
FreeEnvironmentStringsA
GetACP
GetCPInfo
GetCurrentThreadId
GetEnvironmentStrings
GetFileType
GetLastError
GetLocalTime
GetLocaleInfoA
GetModuleFileNameA
GetModuleHandleA
GetOEMCP
GetProcAddress
GetProcessHeap
GetStartupInfoA
GetStdHandle
GetStringTypeA
GetStringTypeW
GetSystemDefaultLangID
GetUserDefaultLCID
GetVersion
GetVersionExA
GlobalAlloc
GlobalFree
GlobalHandle
GlobalLock
GlobalMemoryStatus
GlobalUnlock
HeapAlloc
HeapFree
InitializeCriticalSection
IsValidLocale
LCMapStringA
LeaveCriticalSection
LoadLibraryA
MultiByteToWideChar
OutputDebugStringA
RaiseException
RtlUnwind
SetConsoleCtrlHandler
SetFilePointer
SetHandleCount
SetLastError
SetThreadLocale
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
VirtualQuery
WideCharToMultiByte
WriteFile
lstrcatA
lstrcmpA
lstrcmpiA
lstrcpyA
lstrcpynA
lstrlenA
CharLowerA
CharUpperA
EnumThreadWindows
LoadStringA
MessageBoxA
wsprintfA
StringFromGUID2
LoadTypeLi
RegisterTypeLi
SafeArrayAccessData
SafeArrayAllocData
SafeArrayAllocDescriptor
SafeArrayDestroyDescriptor
SafeArrayRedim
SafeArrayUnaccessData
UnRegisterTypeLi
@WEP$qqsi
DllCanUnloadNow
DllGetClassObject
DllGetDataSnapClassObject
DllRegisterServer
DllUnregisterServer
ExitAlchemy
InitAlchemy
___CPPdebugHook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ