DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
WSPStartup
Static task
static1
Behavioral task
behavioral1
Sample
d612d86185cf982cc628adee78ef9678_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d612d86185cf982cc628adee78ef9678_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
d612d86185cf982cc628adee78ef9678_JaffaCakes118
Size
67KB
MD5
d612d86185cf982cc628adee78ef9678
SHA1
6abc0b11d7385ced36df240a76f478e0f4801db2
SHA256
e0e44bc1a0fe7f4e5b1272267b2422a2227cf1a444a87164380c504f8fa671c3
SHA512
c5aa99eb3c0eb32bf5aac9a86a5c7eeef8acdd8efab84b1711cfb56d81927e89b461403718a58c7e5d053793032f6b611dd4fabb1ddff2b5eb032c065c3022b6
SSDEEP
1536:J23CECIHUd4nuppjllWQPLHdTDg55zZKolOXn2RdH:ACqE4nIjllWcW5zZKo0XER
Checks for missing Authenticode signature.
resource |
---|
d612d86185cf982cc628adee78ef9678_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
FreeLibrary
lstrlenA
lstrcmpiA
GetModuleFileNameA
GetLastError
GetProcAddress
LoadLibraryA
InterlockedIncrement
InterlockedDecrement
lstrlenW
MultiByteToWideChar
GetShortPathNameA
WideCharToMultiByte
SizeofResource
LoadLibraryExA
lstrcpynA
IsDBCSLeadByte
OutputDebugStringA
HeapDestroy
lstrcpyA
LocalFree
LocalAlloc
CloseHandle
CreateMutexA
GetTickCount
EnterCriticalSection
SetLastError
FlushInstructionCache
GetCurrentProcess
GetLocalTime
CreateProcessA
WriteFile
CreateFileA
CompareStringA
CreateEventA
WaitForSingleObject
ResumeThread
ResetEvent
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
GetOEMCP
CreateThread
GetCPInfo
IsBadCodePtr
IsBadReadPtr
SetUnhandledExceptionFilter
GetEnvironmentStringsW
FindResourceA
LeaveCriticalSection
DeleteFileA
GetWindowsDirectoryA
LoadResource
LockResource
InitializeCriticalSection
lstrcatA
DisableThreadLibraryCalls
SetEvent
GetCurrentThreadId
GetACP
DeleteCriticalSection
HeapFree
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
UnhandledExceptionFilter
IsBadWritePtr
VirtualAlloc
ExitThread
GetCommandLineA
TlsSetValue
TlsAlloc
TlsFree
GetVersion
RtlUnwind
HeapAlloc
HeapReAlloc
TerminateProcess
HeapCreate
TlsGetValue
ExitProcess
VirtualFree
KillTimer
CharNextA
SetTimer
IsWindow
DispatchMessageA
SetWindowLongA
MsgWaitForMultipleObjects
GetMessageA
CharLowerA
CreateDialogParamA
DestroyWindow
RegQueryValueA
RegQueryValueExA
RegQueryInfoKeyA
RegSetValueExA
RegEnumValueA
RegOpenKeyExA
RegCloseKey
RegEnumKeyExA
RegCreateKeyExA
RegDeleteKeyA
RegDeleteValueA
CoTaskMemAlloc
StringFromCLSID
CoTaskMemRealloc
CoTaskMemFree
CoCreateInstance
CoInitialize
CoUninitialize
SysStringLen
SysAllocStringLen
VariantClear
LoadTypeLi
LoadRegTypeLi
RegisterTypeLi
SysFreeString
SysAllocString
VarUI4FromStr
VariantChangeType
VariantCopy
gethostbyname
WSACleanup
WSAStartup
InternetOpenA
InternetCloseHandle
InternetReadFile
HttpQueryInfoA
InternetCrackUrlA
HttpSendRequestA
HttpOpenRequestA
InternetConnectA
CreateURLMoniker
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
WSPStartup
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ