DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
c0b1490e445d32c184281b781f602d72_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c0b1490e445d32c184281b781f602d72_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
c0b1490e445d32c184281b781f602d72_JaffaCakes118
Size
97KB
MD5
c0b1490e445d32c184281b781f602d72
SHA1
72e7966c4d2dfd7fe99d2d9ceb674318d6660313
SHA256
45cb876651167bfc56662545984f24b137ec7566d19bbbb198122392e0574230
SHA512
20e2c6d3510fea1ebc5728773fbfb134ff5464973670bf6aff0222cb51902a6748928adb4a9c5417cc9c7d93262a96746488ce8ce19ea4fa61ce575e165fb452
SSDEEP
1536:FaNWhB4KyL3+/ThYMVTyZyZGN/JtQwmsvNojWvIUEhFRDc:kOBWFi/GqsvNoywUsrDc
Checks for missing Authenticode signature.
resource |
---|
c0b1490e445d32c184281b781f602d72_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
EnterCriticalSection
InterlockedDecrement
lstrlenW
GetShortPathNameW
GetModuleHandleW
GetModuleFileNameW
FreeLibrary
MultiByteToWideChar
lstrlenA
SizeofResource
LoadResource
FindResourceW
InterlockedIncrement
LoadLibraryExW
lstrcmpiW
lstrcpynW
HeapDestroy
GetProcAddress
LoadLibraryW
lstrcpyW
lstrcatW
SetEnvironmentVariableA
CompareStringW
CompareStringA
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
DisableThreadLibraryCalls
GlobalFindAtomW
GlobalAddAtomW
GetTempPathW
GetTempFileNameW
GetLastError
Sleep
LCMapStringW
LCMapStringA
GetStringTypeW
GetStringTypeA
LoadLibraryA
GetOEMCP
GetACP
GetCPInfo
WriteFile
GetEnvironmentStringsW
GetEnvironmentStrings
WideCharToMultiByte
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetStartupInfoA
ResumeThread
CreateThread
TlsSetValue
TlsGetValue
ExitThread
CloseHandle
GetTimeZoneInformation
GetSystemTime
GetLocalTime
HeapFree
HeapAlloc
HeapReAlloc
GetCommandLineA
GetVersion
GetCurrentThreadId
TlsAlloc
TlsFree
SetLastError
ExitProcess
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
RtlUnwind
GetModuleHandleA
GetModuleFileNameA
GetEnvironmentVariableA
GetVersionExA
HeapCreate
VirtualFree
VirtualAlloc
SetHandleCount
GetStdHandle
GetFileType
GetClientRect
CharNextW
IsWindow
RegQueryInfoKeyW
RegSetValueExW
RegEnumKeyExW
RegOpenKeyExW
RegCloseKey
RegDeleteValueW
RegCreateKeyExW
RegDeleteKeyW
RegEnumValueW
SHLoadInProc
ShellExecuteW
StringFromGUID2
CoTaskMemFree
CoTaskMemAlloc
CoTaskMemRealloc
CoCreateInstance
SysAllocString
VarUI4FromStr
LoadTypeLi
SysStringLen
LoadRegTypeLi
RegisterTypeLi
SysFreeString
URLDownloadToFileW
PathRenameExtensionW
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ