DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
DummyMethod
DummyMethod1
DummyMethod2
DummyMethod3
DummyMethod4
DummyMethod5
GetClientLocid
GetClientTicket
Static task
static1
Behavioral task
behavioral1
Sample
d4614659d012a81b7e2731860f8167dc_JaffaCakes118.dll
Resource
win7-20240708-en
Target
d4614659d012a81b7e2731860f8167dc_JaffaCakes118
Size
137KB
MD5
d4614659d012a81b7e2731860f8167dc
SHA1
21098a02f59fd37dd4f53eb245c3c11cd6695a54
SHA256
26c7cdf3be5268ab2a787fd347c014893a39d449664d7dc20fb4de6148b89045
SHA512
30981849795333778f3ffcf67844d27e8d9c010280c1d0c922dcf60826d9ceaf8aa366fcfe7ec9cb28b7c62dc17a8a91d5ed20857e1f7eda8d1c4a283f10f80d
SSDEEP
3072:j8v+DycqDr8QPf4fV2sc+67a25kZAxrBd:jXycqcnS7an
Checks for missing Authenticode signature.
resource |
---|
d4614659d012a81b7e2731860f8167dc_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
HttpSendRequestA
HttpQueryInfoA
InternetCrackUrlA
InternetSetCookieA
InternetGetConnectedState
HttpOpenRequestA
PathFileExistsA
StrStrIA
wnsprintfA
GetVersionExA
lstrlenA
GetModuleHandleW
WideCharToMultiByte
LeaveCriticalSection
MultiByteToWideChar
lstrlenW
SetThreadLocale
GetThreadLocale
GetProcAddress
EnterCriticalSection
FindResourceA
FreeLibrary
LoadResource
SizeofResource
IsDBCSLeadByte
lstrcmpiA
LoadLibraryExA
HeapReAlloc
CreateFileA
HeapAlloc
GetCurrentProcess
DeleteCriticalSection
WaitForSingleObject
GetProcessHeap
WriteFile
TerminateThread
Sleep
CreateProcessA
LoadLibraryA
CreateMutexA
CloseHandle
GetTempPathA
LocalFree
CreateThread
GetVolumeInformationA
SetLastError
GetSystemTimeAsFileTime
SetFilePointer
GetModuleHandleA
GetModuleFileNameA
GetLastError
RaiseException
InitializeCriticalSection
InterlockedDecrement
InterlockedIncrement
GetConsoleCP
GetConsoleMode
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
FlushFileBuffers
HeapFree
LCMapStringW
LCMapStringA
GetLocaleInfoA
GetStringTypeW
InitializeCriticalSectionAndSpinCount
RtlUnwind
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
SetHandleCount
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
GetCurrentThreadId
GetCommandLineA
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
HeapSize
ExitProcess
HeapCreate
HeapDestroy
VirtualFree
GetStdHandle
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetStringTypeA
CharNextA
CharNextW
ConvertStringSidToSidW
RegOpenKeyA
RegCreateKeyA
RegQueryValueExA
GetLengthSid
DuplicateTokenEx
SetTokenInformation
OpenProcessToken
RegDeleteValueA
RegCreateKeyExA
RegEnumKeyExA
RegSetValueExA
RegCloseKey
RegQueryInfoKeyA
RegOpenKeyExA
RegDeleteKeyA
StringFromGUID2
CoTaskMemRealloc
CoTaskMemFree
CoTaskMemAlloc
CoCreateInstance
LoadRegTypeLi
VarUI4FromStr
SysAllocStringLen
VariantInit
VariantClear
RegisterTypeLi
UnRegisterTypeLi
LoadTypeLi
SysStringLen
SysAllocString
SysFreeString
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
DummyMethod
DummyMethod1
DummyMethod2
DummyMethod3
DummyMethod4
DummyMethod5
GetClientLocid
GetClientTicket
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ