DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
fd8d1fd44bea3c122128b2b2f6ec6d17_JaffaCakes118.dll
Resource
win7-20240903-en
Target
fd8d1fd44bea3c122128b2b2f6ec6d17_JaffaCakes118
Size
100KB
MD5
fd8d1fd44bea3c122128b2b2f6ec6d17
SHA1
97c1171585af07d26d3ff16733d41a8092de687b
SHA256
a38f3301cd4ad2ce7785b18e71f92b0a9bb7e4c94adc7bc47a74d609d0ee3982
SHA512
413eb1d3e58acdd0ce50dbfdf670184803ba87fd60d00233079b72f41fa52e9529533569822d379137493cc61f87bd4b3980c2016eca411d17c93699489004ea
SSDEEP
1536:F3zJbIIEJOJJbtTVW07P9MZ+KTlf7LC5ltpqnf0SPTJAZRPtSM:VJnxW0L9Mn7LCPtpqnfnNEPtD
Checks for missing Authenticode signature.
resource |
---|
fd8d1fd44bea3c122128b2b2f6ec6d17_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
WideCharToMultiByte
FlushInstructionCache
GetCurrentProcess
GetLocalTime
DeleteFileA
lstrlenW
EnterCriticalSection
IsBadCodePtr
LCMapStringW
LCMapStringA
SetUnhandledExceptionFilter
LeaveCriticalSection
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
GetVersionExA
GetEnvironmentVariableA
TlsGetValue
TlsFree
TlsAlloc
TlsSetValue
DeleteCriticalSection
InitializeCriticalSection
Sleep
GetModuleFileNameA
DisableThreadLibraryCalls
CreateFileA
WriteFile
CloseHandle
LoadLibraryA
GetStringTypeW
GetStringTypeA
GetOEMCP
GetACP
DebugBreak
InterlockedDecrement
InterlockedIncrement
MultiByteToWideChar
lstrlenA
GetModuleFileNameW
LoadLibraryW
OutputDebugStringA
GetVersion
GetFileAttributesW
GetProcAddress
GetModuleHandleW
GetCPInfo
HeapSize
HeapReAlloc
TerminateProcess
ExitProcess
RaiseException
GetCommandLineA
HeapAlloc
GetLastError
SetLastError
GetModuleHandleA
GetEnvironmentStringsW
HeapFree
RtlUnwind
GetCurrentThreadId
LocalFree
DrawIconEx
DestroyWindow
GetCursorPos
GetClientRect
GetWindowLongA
FindWindowA
DefWindowProcA
UnhookWindowsHookEx
SetWindowsHookExA
CreateWindowExA
GetClassNameA
EnumChildWindows
GetActiveWindow
TranslateMessage
DispatchMessageA
GetKeyState
CallNextHookEx
CopyRect
SetFocus
GetFocus
CharLowerA
LoadImageA
SetWindowLongA
GetDC
FindWindowExA
ShowWindow
GetParent
IsWindow
GetWindowTextA
GetWindowTextLengthA
GetWindowRect
MoveWindow
LoadIconA
SendMessageA
DestroyIcon
LoadStringA
CharNextA
wvsprintfA
CallWindowProcA
GetStockObject
RegQueryValueExA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
RegEnumValueA
RegQueryInfoKeyA
RegOpenKeyExA
ShellExecuteA
CoInitialize
SafeArrayCreateVector
SafeArrayAccessData
SafeArrayUnaccessData
SysAllocStringLen
VariantInit
VariantCopy
SysStringLen
LoadRegTypeLi
SysFreeString
SysAllocString
VariantClear
HttpQueryInfoA
InternetOpenA
InternetReadFile
InternetCloseHandle
InternetOpenUrlA
InternetQueryDataAvailable
ImmGetConversionStatus
ImmGetContext
ImmSetConversionStatus
PathFileExistsA
ord15
ord18
ord57
ord16
ord58
ord30
ord46
ord31
ord21
ord23
ord42
ord44
ord43
ord32
ord47
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ