DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
ea9668a16fce028e18d1586f002ccfd4_JaffaCakes118.dll
Resource
win7-20240903-en
Target
ea9668a16fce028e18d1586f002ccfd4_JaffaCakes118
Size
40KB
MD5
ea9668a16fce028e18d1586f002ccfd4
SHA1
f759d96f9f93a428841de302535f1d2ec870f95b
SHA256
d2f1c049df6dfaa0473739fe46139f95e46a45b6eb507897ae16cba6bf280599
SHA512
7ab0b1c49a293a6711ca014064f0a1b3fbd1801833e587b69ab7f9ff8b739e18faa4d8f9d20f10bbb2b6bab3d2f36aca1817ee58494b20ee66ec58beeea4bee2
SSDEEP
768:Ufmx7zstIbZB33/gCms9oslaSdgwof7+8kN5cO9qYQv:Smx7zmK/mUxlaSd1of7+8kN5cO9lQv
Checks for missing Authenticode signature.
resource |
---|
ea9668a16fce028e18d1586f002ccfd4_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
ord6467
ord1131
ord823
ord2725
ord825
ord6117
ord3953
ord4424
ord561
ord3738
ord3079
ord4622
ord4080
ord3830
ord3825
ord3831
ord2985
ord2976
ord3081
ord4465
ord3262
ord3136
ord2982
ord3259
ord3147
ord5307
ord5714
ord5289
ord5302
ord4698
ord4079
ord6402
ord3521
ord4274
ord3346
ord1577
ord269
ord1182
ord600
ord5300
ord826
ord1578
ord1255
ord1253
ord815
ord6375
ord4486
ord2554
ord2512
ord5731
ord3922
ord1089
ord1116
ord1176
ord1575
ord1168
ord2396
ord5199
ord342
ord1243
ord1197
ord1570
memcpy
_purecall
__CxxFrameHandler
free
malloc
realloc
memset
memcmp
__dllonexit
_onexit
_except_handler3
?terminate@@YAXXZ
??1type_info@@UAE@XZ
_initterm
_adjust_fdiv
_CxxThrowException
WideCharToMultiByte
LoadLibraryExA
GetModuleFileNameA
GetModuleHandleA
FreeLibrary
lstrlenA
MultiByteToWideChar
GetShortPathNameA
InterlockedDecrement
EnterCriticalSection
lstrlenW
LeaveCriticalSection
DeleteCriticalSection
InterlockedIncrement
DisableThreadLibraryCalls
SizeofResource
InitializeCriticalSection
FindResourceA
GetLastError
LoadResource
lstrcpynA
IsDBCSLeadByte
lstrcmpiA
GetProcAddress
LoadLibraryA
HeapDestroy
lstrcatA
GetCurrentThreadId
lstrcpyA
LocalFree
LocalAlloc
GetClassNameA
GetKeyState
MessageBoxA
CallNextHookEx
EnumThreadWindows
IsWindow
SetWindowsHookExA
UnhookWindowsHookEx
CharNextA
RegEnumKeyExA
RegEnumValueA
RegQueryInfoKeyA
RegSetValueExA
RegDeleteKeyA
RegOpenKeyExA
RegCloseKey
RegDeleteValueA
RegCreateKeyExA
CoTaskMemAlloc
CoCreateInstance
CoTaskMemRealloc
CoTaskMemFree
LoadTypeLi
RegisterTypeLi
LoadRegTypeLi
SysStringLen
SysAllocString
VariantClear
VariantCopy
VariantInit
SysAllocStringByteLen
VariantChangeType
VarUI4FromStr
SysFreeString
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ