DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
NeedLoad
Start
Stop
Static task
static1
Behavioral task
behavioral1
Sample
07be57e75c96a27051fd730628ce2d13_JaffaCakes118.dll
Resource
win7-20240903-en
Target
07be57e75c96a27051fd730628ce2d13_JaffaCakes118
Size
140KB
MD5
07be57e75c96a27051fd730628ce2d13
SHA1
cb1d89ef442230cf3abbc0dd09d3a150806fb9c0
SHA256
a830361fbe34989742eed1280a2043d3fc61d382c579d27bb5502e8c970c4c01
SHA512
3b5c29e8a65354cff49beb7f7f0afba39c7bc5c2e5457ffe0c0518648832afad54d63ac9e354d521b265d30e13ef9c4d904cde540855b81ef29ef1c3514047d5
SSDEEP
3072:uCNchSCCU80GJmDinIuz8SqqCLtR+JJXwagHR:ugdU8TJmvuznCLmXwaQ
Checks for missing Authenticode signature.
resource |
---|
07be57e75c96a27051fd730628ce2d13_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetWindowsDirectoryA
GetShortPathNameA
CloseHandle
CreateProcessA
lstrcpyW
lstrcpynA
MultiByteToWideChar
WideCharToMultiByte
lstrlenW
TlsSetValue
LocalAlloc
TlsGetValue
GetPrivateProfileSectionA
lstrcmpA
GetPrivateProfileStringA
GetPrivateProfileSectionNamesA
lstrcpyA
FreeLibrary
LoadLibraryA
GlobalFree
GlobalAlloc
GetPrivateProfileIntA
FindClose
FindFirstFileA
GetModuleFileNameA
OutputDebugStringA
GetFileAttributesA
GetCurrentProcessId
DeviceIoControl
TlsFree
TlsAlloc
DisableThreadLibraryCalls
LocalFree
InitializeCriticalSection
DeleteCriticalSection
SizeofResource
LoadResource
FindResourceA
LoadLibraryExA
IsDBCSLeadByte
HeapDestroy
WritePrivateProfileStringA
lstrcpynW
GetLastError
lstrcmpiA
SetLastError
EnterCriticalSection
GetCurrentThreadId
LeaveCriticalSection
GetCurrentProcess
GetSystemDirectoryA
lstrcatA
GetVersionExA
DebugBreak
InterlockedIncrement
InterlockedDecrement
GetModuleHandleW
GetModuleHandleA
GetProcAddress
GetModuleFileNameW
LoadLibraryW
FlushInstructionCache
GlobalLock
lstrlenA
GlobalUnlock
CreateFileA
DrawTextA
GetWindowTextLengthA
InvalidateRect
SetWindowTextA
SendMessageA
GetParent
PostMessageA
SetFocus
GetClassNameA
DefWindowProcA
LoadImageA
CopyRect
FindWindowA
GetClientRect
SetWindowPos
SetCapture
ReleaseCapture
MoveWindow
FrameRect
CharLowerA
CheckMenuRadioItem
AppendMenuA
GetMenuItemCount
GetSubMenu
GetWindowRect
ClientToScreen
GetCursorPos
TrackPopupMenu
CreatePopupMenu
DestroyMenu
SetMenuInfo
GetMenuStringA
SetTimer
KillTimer
RegisterClipboardFormatA
MessageBoxA
DestroyWindow
TranslateAcceleratorA
TranslateMessage
DispatchMessageA
GetFocus
IsChild
ShowWindow
LoadAcceleratorsA
LoadStringA
CharNextA
wvsprintfA
GetClassInfoExA
RegisterClassExA
wsprintfA
CreateWindowExA
SetWindowLongA
GetSystemMetrics
PtInRect
ReleaseDC
FindWindowExA
IsWindow
GetWindowTextA
LoadCursorA
SetCursor
GetWindowLongA
CallWindowProcA
GetDC
ScreenToClient
SelectObject
SetBkMode
SetTextColor
DeleteDC
DeleteObject
CreateSolidBrush
ExtTextOutA
SetBkColor
CreateFontIndirectA
GetObjectA
GetStockObject
RegDeleteValueA
RegQueryValueExA
RegEnumValueA
RegQueryInfoKeyA
RegSetValueExA
RegCloseKey
RegEnumKeyExA
RegOpenKeyExA
RegDeleteKeyA
RegCreateKeyExA
ShellExecuteA
DoDragDrop
CoUninitialize
CoInitialize
CLSIDFromString
CoTaskMemAlloc
CoTaskMemRealloc
StringFromCLSID
CoCreateInstance
CoTaskMemFree
OleRun
ReleaseStgMedium
RegisterDragDrop
RevokeDragDrop
SysAllocStringLen
SysFreeString
VariantClear
VariantInit
VariantCopy
DispCallFunc
LoadRegTypeLi
SysAllocString
GetErrorInfo
VarUI4FromStr
LoadTypeLi
SysStringLen
RegisterTypeLi
SHGetValueA
PathFileExistsA
PathIsRelativeA
SHDeleteValueA
SHDeleteKeyA
SHSetValueA
PathRemoveFileSpecA
PathCombineA
malloc
strcpy
_snprintf
wcscmp
wcsncpy
_mbsstr
time
srand
rand
sscanf
memset
_mbschr
memmove
realloc
_mbscmp
_purecall
strcmp
strcat
strstr
atoi
_ismbcdigit
wcslen
memcpy
_except_handler3
_mbsicmp
free
memcmp
??2@YAPAXI@Z
??3@YAXPAX@Z
__CxxFrameHandler
sprintf
_strlwr
_mbspbrk
_mbsnbcat
_CxxThrowException
__dllonexit
_onexit
?terminate@@YAXXZ
_initterm
_adjust_fdiv
??1type_info@@UAE@XZ
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
NeedLoad
Start
Stop
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ