DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Register
Uninstall
Static task
static1
Behavioral task
behavioral1
Sample
0365ba032b3cd5bbc1095c3457296db4_JaffaCakes118.dll
Resource
win7-20240903-en
Target
0365ba032b3cd5bbc1095c3457296db4_JaffaCakes118
Size
151KB
MD5
0365ba032b3cd5bbc1095c3457296db4
SHA1
22e8a7b9b3b91c7c733a527e2dcb41492c3a8e0e
SHA256
63930d3311ba241e4cf829b1a23bf2a0d518b639f30fbc9b7a018dd2d80c30df
SHA512
3972433981892a12f9c61386baffc97e421f623e34c2dfb8f8ccd33e5e5fa5fb8597262745288c74b68777ce8a7dd8f3a3c169416d2f4d094840d66d8f181b8b
SSDEEP
3072:SUkpIG9yHm5hT94WpE6TCFq0XXm4AGgTJk4gC/xTOobEct6mG:BkKOLKtDTg+5CpTOobEccd
Checks for missing Authenticode signature.
resource |
---|
0365ba032b3cd5bbc1095c3457296db4_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
SHSetValueA
SHDeleteKeyA
PathAppendA
PathFileExistsA
SHDeleteValueA
PathFindFileNameA
SHGetValueA
PathStripToRootA
StrStrIA
PathIsUNCA
PathFindExtensionA
PathRemoveExtensionA
PathRemoveFileSpecA
PathRemoveBlanksA
PathRemoveBackslashA
lstrcmpA
CreateMutexA
OpenMutexA
CreateThread
Sleep
SetThreadPriority
LoadLibraryA
InitializeCriticalSection
DeleteCriticalSection
MapViewOfFile
CreateFileMappingA
OpenFileMappingA
UnmapViewOfFile
LoadLibraryExA
EnterCriticalSection
ReadFile
GetFileSize
CreateFileA
GetShortPathNameA
GetLongPathNameA
GetSystemDirectoryA
GetWindowsDirectoryA
lstrcpynA
lstrlenW
GetTickCount
FindClose
FindNextFileA
FindFirstFileA
SetLastError
GetModuleFileNameA
CopyFileA
FreeLibrary
DeleteFileA
VirtualQuery
lstrcmpiA
CreateToolhelp32Snapshot
ReadProcessMemory
VirtualProtect
WriteProcessMemory
GetCurrentProcessId
Module32First
Module32Next
GetModuleHandleA
GetCurrentProcess
FlushInstructionCache
GetSystemInfo
lstrlenA
MultiByteToWideChar
WaitForSingleObject
TerminateThread
CloseHandle
WideCharToMultiByte
GetModuleFileNameW
LoadLibraryW
GetModuleHandleW
OutputDebugStringA
GetFileAttributesW
GetVersionExA
GetLastError
GlobalSize
GetProcAddress
GetVersion
lstrcatA
lstrcpyA
IsBadStringPtrA
GlobalLock
LeaveCriticalSection
LocalFree
GetPrivateProfileStringA
IsBadStringPtrW
TlsGetValue
TlsSetValue
GetCurrentThreadId
TlsFree
TlsAlloc
WritePrivateProfileSectionA
DeviceIoControl
GetPrivateProfileIntA
WritePrivateProfileStringA
MoveFileExA
WriteFile
WritePrivateProfileStructA
GetTempPathA
InterlockedIncrement
InterlockedDecrement
InterlockedExchange
IsDebuggerPresent
GetACP
CreateProcessA
GetPrivateProfileStructA
GetPropA
RegisterWindowMessageA
GetClassNameA
SendMessageA
SetWindowTextA
IsWindow
GetParent
EnumWindows
MessageBoxA
SetWindowsHookExA
InvalidateRect
ReleaseDC
DrawTextA
GetWindowTextA
FillRect
GetSysColor
GetDC
GetFocus
GetKeyState
SetWindowLongW
GetWindowLongW
GetComboBoxInfo
DrawFocusRect
UnhookWindowsHookEx
CallNextHookEx
GetWindowThreadProcessId
IsWindowVisible
DialogBoxParamA
GetWindow
GetWindowRect
SystemParametersInfoA
GetClientRect
MapWindowPoints
SetWindowPos
GetDlgItemTextA
EndDialog
GetWindowTextLengthA
GetDlgItem
EnableWindow
LoadStringA
EnumChildWindows
SendMessageTimeoutA
WindowFromPoint
DefWindowProcA
CallWindowProcA
FindWindowExA
GetWindowLongA
SetPropA
SetWindowLongA
RemovePropA
RegQueryValueExA
RegDeleteValueA
RegCreateKeyExA
RegSetValueA
RegCreateKeyA
RegSetValueExA
RegOpenKeyA
RegEnumKeyExA
RegCloseKey
CloseServiceHandle
OpenSCManagerA
DeleteService
OpenServiceA
ControlService
RegOpenKeyExA
RevokeDragDrop
RegisterDragDrop
CoCreateGuid
StringFromCLSID
CoTaskMemFree
CoInitialize
CoUninitialize
ReleaseStgMedium
VariantClear
SysAllocString
SysFreeString
ImageDirectoryEntryToData
_mbsrchr
bsearch
fclose
fgets
fopen
_mbclen
_ismbcdigit
atoi
_vsnprintf
_mbsnbcpy
_CxxThrowException
fwrite
rand
srand
time
fread
??1type_info@@UAE@XZ
fseek
ftell
fputs
strstr
rewind
wcslen
strrchr
_wcsicmp
_tempnam
atol
_ltoa
_mbstok
__dllonexit
_onexit
_initterm
_adjust_fdiv
free
_snprintf
realloc
_mbslwr
_mbsstr
_mbschr
_mbsnbicmp
_mbscmp
sprintf
_purecall
wcscpy
_mbsicmp
__CxxFrameHandler
??2@YAPAXI@Z
??3@YAXPAX@Z
_except_handler3
tmpnam
_stricmp
_strlwr
_itoa
malloc
IsValidURL
URLDownloadToFileA
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
send
gethostbyname
setsockopt
socket
inet_addr
WSAStartup
WSACleanup
closesocket
recv
inet_ntoa
htons
connect
WSAGetLastError
SetBkMode
GetStockObject
DeleteObject
CreateSolidBrush
SetTextColor
GetTextExtentPointA
SetPixel
LineTo
MoveToEx
CreatePen
SetBkColor
SelectObject
SHGetMalloc
SHGetSpecialFolderLocation
SHGetDesktopFolder
ShellExecuteA
SHGetSpecialFolderPathA
InternetCrackUrlA
DeleteUrlCacheEntry
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Register
Uninstall
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ