DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
RunIE
Static task
static1
Behavioral task
behavioral1
Sample
d9d56aba22c4786722714a241e5ff25a_JaffaCakes118.dll
Resource
win7-20240708-en
Target
d9d56aba22c4786722714a241e5ff25a_JaffaCakes118
Size
84KB
MD5
d9d56aba22c4786722714a241e5ff25a
SHA1
7783d250087681a1a56645ab90b876ed962cde9f
SHA256
a731dacfb109f48e4c7d3a914ad8aee850015c8bff1276b360fe21574a959f4c
SHA512
f2c0d8f3bdc1bfef3a2808c92b090abf3441decf7e8b9659e9521d1be383e74d9e1003f390fce161ab2270c418b9eb033986dba5492637304a2a576759119bc4
SSDEEP
1536:CJIBWDfol/JCu5BDy9Bh1YOxaTGhmmH/elvEO19NQQr6cnKFw/jYF0sp8SZ21bPO:CmBWDfQJCu5BDy9Bh1YOxaTGhmmH/elN
Checks for missing Authenticode signature.
resource |
---|
d9d56aba22c4786722714a241e5ff25a_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
MultiByteToWideChar
lstrlenW
lstrlenA
DeleteCriticalSection
InterlockedIncrement
InterlockedDecrement
CreateMutexA
CreateEventA
GetVersionExA
OpenMutexA
WaitForSingleObject
SetEvent
InitializeCriticalSection
LeaveCriticalSection
MapViewOfFile
CreateFileMappingA
EnterCriticalSection
UnmapViewOfFile
DeviceIoControl
FreeLibrary
GetTickCount
GetProcAddress
LoadLibraryA
GetVolumeInformationA
CreateProcessA
WideCharToMultiByte
VirtualProtect
IsBadReadPtr
GetVersion
GetModuleHandleA
IsBadCodePtr
Module32Next
Module32First
CreateToolhelp32Snapshot
GetCurrentProcessId
DisableThreadLibraryCalls
HeapDestroy
GetShortPathNameA
CreateThread
GetCurrentThreadId
CloseHandle
CreateFileA
SetFilePointer
ReadFile
SetLastError
GetModuleFileNameA
GetEnvironmentVariableA
GetLastError
GetClassNameA
EnumThreadWindows
IsWindow
SetSecurityDescriptorDacl
RegQueryValueExA
RegCloseKey
InitializeSecurityDescriptor
RegSetValueExA
RegCreateKeyExA
RegOpenKeyExA
CoCreateInstance
CoInitializeEx
CoUninitialize
SysStringLen
LoadRegTypeLi
SysAllocStringLen
SysFreeString
IsValidURL
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ID@Z
?_Freeze@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
??Hstd@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@ABV10@PBD@Z
?compare@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEHIIPBDI@Z
?find@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDII@Z
?substr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBE?AV12@II@Z
?find_first_of@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDII@Z
??Hstd@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@PBDABV10@@Z
??Mstd@@YA_NABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@0@Z
??0_Lockit@std@@QAE@XZ
??1_Lockit@std@@QAE@XZ
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
??Hstd@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@ABV10@0@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
SHGetSpecialFolderPathA
_purecall
memcmp
rand
_strcmpi
srand
?terminate@@YAXXZ
__dllonexit
_onexit
_initterm
_strdup
_strlwr
_adjust_fdiv
strstr
_strnicmp
__CxxFrameHandler
strlen
??2@YAPAXI@Z
strcpy
memset
sprintf
memcpy
div
malloc
strcat
strncpy
wcslen
free
_stricmp
_except_handler3
strncat
SnmpUtilOidCpy
PathFileExistsA
SHDeleteKeyA
PathGetDriveNumberA
InternetReadFile
InternetOpenUrlA
InternetQueryDataAvailable
InternetCanonicalizeUrlA
InternetCloseHandle
InternetOpenA
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
RunIE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ