DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
c76255970e33b7b3a930be43f85354ee_JaffaCakes118.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
c76255970e33b7b3a930be43f85354ee_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
c76255970e33b7b3a930be43f85354ee_JaffaCakes118
Size
39KB
MD5
c76255970e33b7b3a930be43f85354ee
SHA1
7a6e2b60761fa74b926500f875d2cc22bb109f6d
SHA256
dfca056c3f4d253984c0cb4c276490fd9a075c6177e26251ad5a8747d8b8a2a7
SHA512
c657bc55565e8821ee0014b6fccab058852f773c7724faf09a4d7c5b4f6dc25d267b6f418db41cf07954af83975bbdf9783aa03c48b517766ad999e9c2280017
SSDEEP
768:t5L95z7eSjKKib2ntUYJu5nVnuHZo4rgeXnYyvSW6zj4eF6DsFeJ3a3/maKBkLqu:HL9NKSjpibmUYY5duHmSXnYyvSF6D6eO
Checks for missing Authenticode signature.
resource |
---|
c76255970e33b7b3a930be43f85354ee_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
memcpy
sprintf
_except_handler3
memset
memcmp
strtoul
_itoa
strcmp
_stricmp
free
malloc
_strupr
_initterm
_adjust_fdiv
memmove
RegDeleteValueA
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
RegOpenKeyExA
RegQueryValueExA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
RegOpenKeyA
SendMessageA
IsWindow
SetTimer
KillTimer
DefWindowProcA
PostQuitMessage
DispatchMessageA
TranslateMessage
GetMessageA
ShowWindow
MoveWindow
CreateWindowExA
RegisterClassExA
GetWindowThreadProcessId
DisableThreadLibraryCalls
CreateToolhelp32Snapshot
Thread32First
LocalAlloc
Thread32Next
ExpandEnvironmentStringsA
MoveFileExA
FindResourceA
GetLastError
CreateMutexA
SetUnhandledExceptionFilter
InitializeCriticalSection
CreateEventA
LocalFree
SetErrorMode
OpenProcess
OpenThread
FindFirstFileA
SizeofResource
LoadResource
LockResource
FreeResource
CreateThread
GetProcAddress
FreeLibrary
SetEvent
ResumeThread
VirtualAllocEx
lstrcpynA
WriteProcessMemory
GetThreadContext
SetThreadContext
TerminateProcess
IsBadReadPtr
VirtualFree
CloseHandle
WriteFile
CreateFileA
VirtualAlloc
ReadFile
GetFileSize
SetFileAttributesA
CreateDirectoryA
GetFileAttributesA
lstrcatA
GetWindowsDirectoryA
FindClose
FindNextFileA
DeleteFileA
lstrcpyA
lstrlenA
GetTempFileNameA
Sleep
lstrcmpiA
MapViewOfFile
CreateFileMappingA
GetVolumeInformationA
GetSystemDirectoryA
IsBadWritePtr
LoadLibraryA
WideCharToMultiByte
ExitProcess
lstrcmpA
SetFilePointer
VirtualProtect
GetModuleFileNameA
GetModuleHandleA
GetCurrentProcessId
ResetEvent
CreateProcessA
GetStartupInfoA
LeaveCriticalSection
EnterCriticalSection
WaitForSingleObject
ExitThread
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ