DispatchMemory
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IAlloc
Static task
static1
Behavioral task
behavioral1
Sample
fb4b5eae73fbd6d0ad2f08395f06bb92_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fb4b5eae73fbd6d0ad2f08395f06bb92_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
fb4b5eae73fbd6d0ad2f08395f06bb92_JaffaCakes118
Size
1008KB
MD5
fb4b5eae73fbd6d0ad2f08395f06bb92
SHA1
4e8645cd0fafd3185e42b0a0a8ccfc6bdf74de7a
SHA256
58db4d0c7c26e154afc9f39eb1a41c0a8e7b331a0d3e59ad78cff16411eba04a
SHA512
543ac231c3a34bd354a9bb3b6e6db3b745357a94a8550066722eefdf549a7a2ef4b6326ffa6c27c63599de86b0195f0f7d81bd60745273bb9d32b6370f5f98b8
SSDEEP
24576:Z1dwERHwQzUvDGBj82PF8VNUnSTVqJ7kX:Z1BBUqnFWNeSTw
Checks for missing Authenticode signature.
resource |
---|
fb4b5eae73fbd6d0ad2f08395f06bb92_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
NdrClientCall2
RpcBindingFromStringBindingA
RpcStringBindingComposeA
RpcBindingFree
RpcStringFreeA
RemoveDirectoryA
SetCurrentDirectoryA
GetCurrentDirectoryA
FindClose
FindNextFileA
FindFirstFileA
CreateRemoteThread
WriteProcessMemory
VirtualAllocEx
GetACP
OpenProcess
GetSystemTime
OpenSemaphoreA
DuplicateHandle
GetCurrentProcess
HeapAlloc
HeapFree
HeapCreate
HeapDestroy
GetTimeZoneInformation
LocalFree
GetVersionExA
GetVolumeInformationA
TerminateProcess
FlushFileBuffers
TerminateThread
GetDriveTypeA
ExpandEnvironmentStringsA
ResetEvent
SetLastError
SystemTimeToFileTime
GetThreadPriority
LockResource
LoadResource
SizeofResource
FindResourceA
GetWindowsDirectoryA
SetFileAttributesA
GetProcessHeap
GetFullPathNameA
GetComputerNameW
GetShortPathNameA
GetLocaleInfoA
ReleaseMutex
GetSystemInfo
FileTimeToDosDateTime
GetEnvironmentStrings
FreeEnvironmentStringsA
GetConsoleMode
GetConsoleCP
GetStartupInfoA
GetFileType
SetHandleCount
GetStringTypeW
GetStringTypeA
HeapSize
HeapReAlloc
VirtualAlloc
VirtualFree
LCMapStringW
LCMapStringA
ExitProcess
GetStdHandle
IsValidCodePage
GetOEMCP
GetCPInfo
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetCommandLineA
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RaiseException
GetDateFormatA
GetTimeFormatA
CreateThread
ExitThread
RtlUnwind
GetSystemTimeAsFileTime
CreateMutexA
OpenMutexA
GetLocalTime
GetVersion
lstrlenA
WideCharToMultiByte
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetStdHandle
CompareStringA
InterlockedDecrement
DeviceIoControl
GetCurrentProcessId
DisableThreadLibraryCalls
CreateSemaphoreA
GetModuleHandleA
GetModuleFileNameA
OutputDebugStringA
CreateDirectoryA
CreateFileMappingA
MapViewOfFile
UnmapViewOfFile
SetEndOfFile
GetSystemDirectoryA
GetFileTime
SetFileTime
MoveFileA
CopyFileA
GetComputerNameA
FileTimeToLocalFileTime
FileTimeToSystemTime
CreateEventA
ResumeThread
SetEvent
InterlockedIncrement
GetCurrentThreadId
WaitForSingleObject
GetDiskFreeSpaceA
FreeLibrary
LoadLibraryA
GetProcAddress
GetLastError
FormatMessageA
GetTickCount
MultiByteToWideChar
WriteFile
CompareStringW
SetEnvironmentVariableA
Sleep
SetFilePointer
VirtualProtect
DeleteFileA
DeleteCriticalSection
GetTempPathA
CreateFileA
GetFileSize
ReadFile
CloseHandle
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
MoveWindow
GetParent
ExitWindowsEx
SetWindowPos
GetWindowRect
GetSystemMetrics
LoadKeyboardLayoutA
ActivateKeyboardLayout
UnloadKeyboardLayout
CharLowerA
GetDesktopWindow
GetKeyNameTextA
GetAsyncKeyState
GetKeyboardLayout
ToAsciiEx
GetDC
ReleaseDC
EnumDisplaySettingsA
MessageBoxA
SetWindowsHookExA
BeginPaint
EndPaint
LoadIconA
LoadCursorA
SetTimer
GetProcessWindowStation
GetUserObjectInformationA
GetForegroundWindow
GetKeyState
GetKeyboardLayoutNameA
CallNextHookEx
UnregisterHotKey
RegisterHotKey
LoadStringA
GetWindowThreadProcessId
SendMessageA
SetDlgItemTextA
KillTimer
UnregisterClassA
RegisterClassA
CreateWindowExA
GetWindowLongA
DefWindowProcA
SetWindowLongA
GetCursorPos
PostMessageA
wsprintfW
ShowWindow
DialogBoxParamA
GetPropA
RemovePropA
SetPropA
DestroyWindow
GetMessageA
IsWindow
TranslateMessage
DispatchMessageA
SetForegroundWindow
EndDialog
wsprintfA
MapVirtualKeyExA
MapVirtualKeyA
GetActiveWindow
UnhookWindowsHookEx
DeleteDC
DeleteObject
StretchBlt
CreateDIBSection
BitBlt
SelectObject
CreateCompatibleBitmap
CreateCompatibleDC
GetDeviceCaps
GetStockObject
CreateDCA
DeleteService
InitiateSystemShutdownA
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
RegEnumValueA
RegEnumKeyExA
RegDeleteKeyA
RegSetKeySecurity
RegGetKeySecurity
GetTokenInformation
GetSecurityInfo
SetEntriesInAclA
SetSecurityInfo
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
LogonUserA
GetUserNameA
RegCloseKey
RegQueryValueExA
RegCreateKeyExA
RegSetValueExA
RegDeleteValueA
RegOpenKeyExA
CloseServiceHandle
OpenServiceA
OpenSCManagerA
RevertToSelf
ImpersonateLoggedOnUser
DuplicateToken
ShellExecuteA
SHLoadInProc
CoTaskMemFree
StringFromCLSID
CoCreateInstance
CoInitialize
CoUninitialize
CoCreateGuid
SysFreeString
SysStringLen
SysAllocString
VariantClear
VariantInit
SysAllocStringLen
DispatchMemory
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IAlloc
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ