DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
fe9b110cdf650ada5592f90b1b807a53_JaffaCakes118.dll
Resource
win7-20240708-en
Target
fe9b110cdf650ada5592f90b1b807a53_JaffaCakes118
Size
100KB
MD5
fe9b110cdf650ada5592f90b1b807a53
SHA1
8148af1bcd9d0a2f5066b5c778d01516f4f1df09
SHA256
e6dbfb1ff447be72f7085bb651005c9c6a8e294907f2827e76701154cc5919c0
SHA512
8b256aa320069a2f6c351dd1be1433ce0cb175a66ca45ac08402da315c83ece65c8d2a0f1a1abff8c5bb2d7ca0f42a4c3c5a120d40ddd0fa8d1db1dcb16577ce
SSDEEP
1536:n/pJ8LJRRwKsmpnv8CzPie4FgKMPLqp18:n/pJ8pwKXpnv8CzPiLgLqp18
Checks for missing Authenticode signature.
resource |
---|
fe9b110cdf650ada5592f90b1b807a53_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
bind
listen
accept
send
select
recv
WSAStartup
gethostbyname
htons
connect
socket
closesocket
GetCurrentThreadId
MultiByteToWideChar
SetEvent
ReadFile
GetFileSize
CreateFileA
GetCurrentProcess
SetFileTime
WriteFile
MoveFileA
DeleteFileA
GetFileTime
Sleep
FindNextFileA
SetFilePointer
FindFirstFileA
GetModuleFileNameA
SetFileAttributesA
GetTempPathA
QueryPerformanceCounter
SetEndOfFile
CreateEventA
OpenEventA
GetLastError
lstrlenW
DisableThreadLibraryCalls
DeleteCriticalSection
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
InterlockedExchange
lstrlenA
lstrcmpA
InterlockedIncrement
lstrcpyA
GetProcAddress
LoadLibraryA
LocalFree
LocalAlloc
GetSystemDirectoryA
CloseHandle
Thread32Next
Thread32First
CreateToolhelp32Snapshot
GetCurrentProcessId
ExitThread
FreeLibrary
CreateThread
WideCharToMultiByte
GetTickCount
GetTempPathW
RaiseException
ResetEvent
WaitForSingleObject
GetModuleHandleA
lstrcatA
InterlockedDecrement
ExitWindowsEx
GetDC
ReleaseDC
FillRect
GetMessageA
TranslateMessage
DispatchMessageA
DrawTextA
wsprintfA
SetTimer
GetForegroundWindow
AttachThreadInput
GetKeyboardState
GetKeyboardLayout
ToAsciiEx
GetCursorPos
ScreenToClient
RegisterWindowMessageA
SendMessageTimeoutA
CallNextHookEx
GetWindowThreadProcessId
SetWindowsHookExA
UnhookWindowsHookEx
KillTimer
wsprintfW
EnumThreadWindows
IsWindowVisible
GetAncestor
GetSystemMetrics
SendMessageA
WindowFromPoint
GetClassNameA
DrawTextW
CreateSolidBrush
CreateFontIndirectA
CreateCompatibleDC
SetTextColor
SetBkColor
CreateCompatibleBitmap
BitBlt
SelectObject
DeleteObject
DeleteDC
GetUserNameA
RegQueryValueExA
RegEnumValueA
IsTextUnicode
RegEnumKeyExA
RegOpenKeyExA
RegFlushKey
RegSetValueExA
RegCreateKeyExA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegCloseKey
RegDeleteValueA
RegDeleteKeyA
ShellExecuteA
CoInitialize
CoUninitialize
CLSIDFromString
LoadRegTypeLi
SysStringLen
VariantCopy
VariantInit
VariantClear
SysFreeString
SysAllocString
GetErrorInfo
ord23
ord58
ord30
ord32
ord57
ord18
ord15
ord16
ord21
ord31
free
atoi
wcscmp
rand
__CxxFrameHandler
sprintf
strstr
strncpy
strchr
wcslen
_strupr
isdigit
isalpha
??2@YAPAXI@Z
srand
strrchr
_purecall
_except_handler3
fclose
fread
fopen
fwrite
_EH_prolog
memcpy
strlen
strcpy
realloc
_mbsnbicmp
memmove
_mbsstr
_mbsnbcmp
_mbsicmp
fseek
_strnicmp
?terminate@@YAXXZ
malloc
strncat
??3@YAXPAX@Z
__dllonexit
_onexit
_initterm
_adjust_fdiv
??1type_info@@UAE@XZ
_CxxThrowException
time
_strlwr
_itoa
ftell
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ