DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
d6956f44043dd138d8f1a920fa91cd5f_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d6956f44043dd138d8f1a920fa91cd5f_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
d6956f44043dd138d8f1a920fa91cd5f_JaffaCakes118
Size
276KB
MD5
d6956f44043dd138d8f1a920fa91cd5f
SHA1
957cf009307ccfac0d5e0fab671d2c8988ead2d4
SHA256
ec77c1f559f917c90647d14d07c1c4f35a6daee1687d1d22aa17bbcb3f751082
SHA512
6260c5ed4a23e2897f22c1af98165ace5dd63189e3bcbab44d4af6470453de26c0b0b1ecfea10ec27fecc4e13e0b9b3f5c8491d1c989416c2489677dab1882b5
SSDEEP
3072:32T3/LGL7bqM9cALVcIFtGEfXCTP3so5phDWgd8dI6:mT3/LGjvc0Xe2CTP3TphDJd8n
Checks for missing Authenticode signature.
resource |
---|
d6956f44043dd138d8f1a920fa91cd5f_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
InternetSetFilePointer
InternetCloseHandle
InternetOpenUrlA
InternetReadFile
DeleteUrlCacheEntry
FindNextUrlCacheEntryA
InternetOpenA
FindFirstUrlCacheEntryA
ord17
CreateToolbarEx
WritePrivateProfileStringA
GetPrivateProfileStringA
WritePrivateProfileSectionA
GetPrivateProfileSectionA
WriteFile
DeleteFileA
lstrcpyW
CopyFileA
SetFilePointer
GetFileSize
CreateFileA
ReleaseMutex
MoveFileExA
Sleep
CreateMutexA
GetLocalTime
GetPrivateProfileIntA
CreateDirectoryA
GetSystemDirectoryA
CompareStringA
CompareStringW
InterlockedDecrement
FreeLibrary
GetProcAddress
LoadLibraryA
GetModuleHandleA
GetModuleFileNameA
GetACP
GetLocaleInfoA
GetThreadLocale
GetVersionExA
GetStringTypeW
GetStringTypeA
OpenFile
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
HeapSize
GetStartupInfoA
GetFileType
SetHandleCount
GetTimeZoneInformation
GetStdHandle
ExitProcess
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
LCMapStringW
LCMapStringA
SetLastError
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetOEMCP
InterlockedIncrement
GetCPInfo
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
VirtualFree
HeapCreate
HeapDestroy
GetProcessHeap
GetCommandLineA
GetCurrentThreadId
VirtualAlloc
ReadFile
ResumeThread
ExitThread
MoveFileA
RaiseException
GetSystemTimeAsFileTime
RtlUnwind
HeapAlloc
HeapReAlloc
HeapFree
FindFirstFileA
FindClose
CreateProcessA
WideCharToMultiByte
MultiByteToWideChar
InterlockedExchange
lstrlenA
lstrcpyA
lstrcatA
CreateThread
WaitForSingleObject
CloseHandle
FlushFileBuffers
SetStdHandle
GetLastError
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetEndOfFile
SetEnvironmentVariableA
LocalFree
InitializeCriticalSection
GetConsoleMode
GetConsoleCP
LoadBitmapA
SetWindowTextW
MoveWindow
GetDlgCtrlID
TranslateMessage
DispatchMessageA
ClientToScreen
TrackPopupMenuEx
MapVirtualKeyA
keybd_event
GetClassInfoA
RegisterClassA
GetWindowRect
GetParent
CreateWindowExA
SetWindowLongA
DefWindowProcA
GetWindowTextLengthA
SetWindowTextA
GetDC
ReleaseDC
GetClientRect
GetSysColorBrush
FillRect
SetCursor
LoadCursorA
TrackMouseEvent
CallWindowProcA
GetSysColor
wsprintfA
SendMessageA
DrawTextA
GetWindowTextA
GetCursorPos
ScreenToClient
ChildWindowFromPoint
SetCapture
InvalidateRect
AppendMenuA
CreatePopupMenu
BeginPaint
SetTimer
KillTimer
EndPaint
SetFocus
IsWindowVisible
IsWindow
ReleaseCapture
DestroyMenu
ShowWindow
GetWindowLongA
DestroyWindow
RegSetValueExA
RegCreateKeyA
RegQueryValueExA
RegOpenKeyA
RegDeleteValueA
RegCreateKeyExA
RegCloseKey
StringFromIID
CoGetMalloc
ShellExecuteA
SHGetSpecialFolderPathA
SysAllocStringLen
SysStringLen
VarBstrCat
SysFreeString
VariantClear
SysAllocString
StrStrIA
socket
WSAStartup
htons
closesocket
sendto
inet_addr
TransparentBlt
LineTo
CreateRoundRectRgn
MoveToEx
DeleteObject
SetTextColor
GetTextMetricsA
SetBkMode
CreateFontIndirectA
GetTextExtentPoint32A
SelectObject
CreateCompatibleDC
GetStockObject
GetTextColor
CreatePen
DeleteDC
GetObjectA
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ