DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
eb21f60c013e7bbbd5b25aafd291dbc3_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eb21f60c013e7bbbd5b25aafd291dbc3_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
eb21f60c013e7bbbd5b25aafd291dbc3_JaffaCakes118
Size
236KB
MD5
eb21f60c013e7bbbd5b25aafd291dbc3
SHA1
b83d119be32de3ad0fb8be04ab23c1ba44a9eafc
SHA256
b3bc594342ee226bb872714a2e5296fceb8d8e7017c1a2088cea4cd05a33fe5e
SHA512
99b7e4a3fe4c9d91411d144976bf21721aca6e28acb6acaf048952e6bfea5e351d99cad5cc2db5540c5c523335327a1d1140f8b8bca562d5504754b3168b8aa9
SSDEEP
3072:ART+V0SFseNgnBRVP05ksNPw6TrsAkZ9oJcJa8aPgZAk1NVhRATk:Ad+VdFse6RVPEkMwMTcdbZAk1NBGk
Checks for missing Authenticode signature.
resource |
---|
eb21f60c013e7bbbd5b25aafd291dbc3_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
InitializeCriticalSection
LeaveCriticalSection
InterlockedIncrement
InterlockedDecrement
FreeLibrary
lstrcmpiW
LoadLibraryExW
GetModuleHandleW
CreateFileW
DeleteFileA
FlushFileBuffers
GetCurrentProcessId
GetFileAttributesW
GetLastError
VirtualQuery
LoadLibraryW
GetProcAddress
lstrlenA
lstrcpyA
GetTempPathA
GetTempFileNameW
WideCharToMultiByte
CreateMutexW
GetCurrentProcess
GlobalLock
OpenProcess
Sleep
lstrcmpW
GlobalUnlock
EnterCriticalSection
InterlockedExchangeAdd
DuplicateHandle
ReadFile
SetFilePointer
InterlockedExchange
SetEnvironmentVariableA
CompareStringW
CompareStringA
GetStringTypeW
LoadLibraryA
GetTickCount
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
MultiByteToWideChar
RaiseException
DeleteCriticalSection
FindResourceExW
LoadResource
LockResource
GetVersionExW
SizeofResource
GetModuleFileNameW
CloseHandle
WriteFile
CreateFileA
lstrcatA
lstrcpynA
GetModuleHandleA
GetModuleFileNameA
FindResourceW
lstrlenW
OpenMutexW
GetTimeZoneInformation
GetDateFormatA
GetTimeFormatA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
TlsSetValue
TlsAlloc
TlsGetValue
RtlUnwind
GetCommandLineA
GetCurrentThreadId
GetSystemInfo
VirtualAlloc
VirtualProtect
GetSystemTimeAsFileTime
GetConsoleMode
GetConsoleCP
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetThreadLocale
GetLocaleInfoA
GetACP
GetVersionExA
GetProcessHeap
HeapSize
HeapReAlloc
HeapFree
GetStartupInfoA
SetHandleCount
GetFileType
LCMapStringW
LCMapStringA
GetOEMCP
GetCPInfo
GetStdHandle
HeapCreate
VirtualFree
ExitProcess
SetLastError
HeapAlloc
HeapDestroy
TlsFree
SetWindowLongW
SetTimer
KillTimer
GetParent
CallWindowProcW
CharNextW
UnhookWindowsHookEx
GetWindow
GetClassNameW
FindWindowExW
GetWindowLongW
GetKeyboardLayout
GetTopWindow
SendMessageW
UnregisterClassA
PtInRect
RegisterWindowMessageW
DeleteObject
StretchBlt
SelectObject
DeleteDC
CreateCompatibleDC
CreateDIBSection
GetObjectW
GetDIBColorTable
RegQueryValueExW
RegDeleteValueW
RegOpenKeyExW
RegEnumKeyExW
RegQueryInfoKeyW
RegDeleteKeyW
RegCloseKey
RegSetValueExW
RegCreateKeyExW
SHGetSpecialFolderPathW
CoTaskMemAlloc
CoTaskMemRealloc
CoTaskMemFree
CoCreateInstance
SysAllocString
VariantChangeType
SysReAllocStringLen
SafeArrayUnlock
SafeArrayLock
SafeArrayDestroy
DispCallFunc
SafeArrayGetUBound
SafeArrayGetLBound
SafeArrayGetVartype
LoadRegTypeLi
SysStringLen
VarBstrCat
VarBstrCmp
SysAllocStringByteLen
SysStringByteLen
SysAllocStringLen
VariantCopy
VariantClear
VariantInit
SysFreeString
VarUI4FromStr
LoadTypeLi
PathFindExtensionW
GdipCreateBitmapFromScan0
GdiplusStartup
GdipGetImageEncodersSize
GdipGetImageEncoders
GdipFree
GdiplusShutdown
GdipSaveImageToFile
GdipCreateBitmapFromHBITMAP
GdipDisposeImage
GdipAlloc
GdipCloneImage
TransparentBlt
AlphaBlend
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ