DllCanUnloadNow
DllGetClassObject
DllMain
DllRegisterServer
DllUnregisterServer
GetAVWndHooksInst
Static task
static1
Behavioral task
behavioral1
Sample
c77a36d714bc1f1403ea3866a1296cc3_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c77a36d714bc1f1403ea3866a1296cc3_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
c77a36d714bc1f1403ea3866a1296cc3_JaffaCakes118
Size
136KB
MD5
c77a36d714bc1f1403ea3866a1296cc3
SHA1
b14580f4c9dd40a0640fdb821af7617db34df59b
SHA256
facfb9b4c064864a18ec9ddfed703edb5ef7ea7e39375be6a006640aad7f075e
SHA512
1a37cab2fd837048586156c71f8a385468068eb7b1f791e566ca74fd7feeff43a51b80671574e83305579ad5f880fb65eff2b8b780b3b93c46e7b7e1e8a1f9ee
SSDEEP
3072:ND4qBznVoo2wFkG8JIqoxwDEwyoeBu5bz9392kMDDn:XQdRQYB9t2kqDn
Checks for missing Authenticode signature.
resource |
---|
c77a36d714bc1f1403ea3866a1296cc3_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
MultiByteToWideChar
lstrlenA
GlobalUnlock
GlobalLock
GlobalAlloc
lstrlenW
lstrcmpA
MulDiv
HeapFree
FlushInstructionCache
GetProcessHeap
HeapAlloc
GetCurrentThreadId
WideCharToMultiByte
InterlockedExchange
GetACP
GetLocaleInfoA
GetThreadLocale
GetVersionExA
FindResourceA
SizeofResource
LockResource
LoadResource
FindResourceExA
VirtualProtect
GetLastError
lstrcmpiA
lstrcpynA
IsDBCSLeadByte
InterlockedIncrement
GetProcAddress
FreeLibrary
LoadLibraryExA
lstrcatA
GetPrivateProfileStringA
InterlockedDecrement
CompareFileTime
Sleep
GetTickCount
QueryPerformanceCounter
ExitProcess
HeapSize
HeapReAlloc
HeapDestroy
GetSystemTimeAsFileTime
EnterCriticalSection
GetCurrentProcess
OpenFileMappingA
OpenEventA
CloseHandle
OpenMutexA
ResetEvent
SetEvent
UnmapViewOfFile
ReleaseMutex
MapViewOfFile
WaitForSingleObject
LocalFree
RaiseException
GetModuleHandleA
GetModuleFileNameA
GetCurrentProcessId
DeleteCriticalSection
InitializeCriticalSection
LeaveCriticalSection
lstrcpyA
IsWindow
GetWindowLongA
PostMessageA
CallNextHookEx
SetCursor
GetCursorPos
WindowFromPoint
GetAncestor
LoadCursorA
UnregisterClassA
UnhookWindowsHookEx
SetWindowsHookExA
SendMessageA
LoadStringA
GetAsyncKeyState
wsprintfA
GetClassInfoExA
RegisterClassExA
SetWindowLongA
CreateWindowExA
DestroyWindow
CallWindowProcA
DefWindowProcA
DestroyAcceleratorTable
GetSysColor
BeginPaint
GetClientRect
FillRect
EndPaint
GetDC
ReleaseDC
IsChild
GetFocus
SetFocus
GetWindow
GetDlgItem
RedrawWindow
GetParent
CharNextA
SetWindowPos
CreateAcceleratorTableA
SetCapture
ReleaseCapture
InvalidateRect
InvalidateRgn
GetDesktopWindow
RegisterWindowMessageA
SetWindowTextA
GetClassNameA
GetWindowTextA
GetWindowTextLengthA
DispatchMessageW
GetMessageA
GetMessageW
IsWindowUnicode
DispatchMessageA
TranslateMessage
PeekMessageA
CreateCompatibleBitmap
CreateCompatibleDC
CreateSolidBrush
BitBlt
SelectObject
DeleteDC
DeleteObject
GetDeviceCaps
GetStockObject
GetObjectA
RegQueryInfoKeyA
RegDeleteValueA
RegOpenKeyExA
RegCloseKey
RegCreateKeyExA
RegEnumKeyExA
RegDeleteKeyA
RegSetValueExA
RegQueryValueExA
SHGetFileInfoA
OleUninitialize
OleInitialize
CoTaskMemAlloc
StringFromGUID2
OleLockRunning
CreateStreamOnHGlobal
CoCreateInstance
CoGetClassObject
CLSIDFromProgID
CLSIDFromString
StringFromCLSID
CoTaskMemRealloc
CoTaskMemFree
SysAllocStringByteLen
SysAllocStringLen
OleCreateFontIndirect
SysFreeString
LoadRegTypeLi
LoadTypeLi
SysStringLen
SysStringByteLen
SysAllocString
VariantClear
VariantInit
VarUI4FromStr
DispCallFunc
RegisterTypeLi
UnRegisterTypeLi
PathStripPathA
SHDeleteKeyA
PathFindExtensionA
??Y?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@PBD@Z
?_Nomemory@std@@YAXXZ
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@ABV01@@Z
?rfind@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDI@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@PBD@Z
?erase@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@II@Z
??Y?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@ABV01@@Z
?c_str@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEPBDXZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
__security_error_handler
__CppXcptFilter
_adjust_fdiv
_initterm
?terminate@@YAXXZ
??1type_info@@UAE@XZ
_onexit
__dllonexit
_callnewh
memset
_except_handler3
_CxxThrowException
??0exception@@QAE@ABQBD@Z
?what@exception@@UBEPBDXZ
__CxxFrameHandler
??1exception@@UAE@XZ
??3@YAXPAX@Z
??0exception@@QAE@XZ
free
??0exception@@QAE@ABV0@@Z
_purecall
malloc
memmove
??_V@YAXPAX@Z
_resetstkoflw
realloc
_mbsrchr
_mbslwr
_mbscmp
_mbschr
wcslen
wcsspn
wcscspn
wcspbrk
_wcslwr
_mbsicmp
_mbsstr
_vscwprintf
vswprintf
wcscmp
wcsncpy
DllCanUnloadNow
DllGetClassObject
DllMain
DllRegisterServer
DllUnregisterServer
GetAVWndHooksInst
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.