DllCanUnloadNow
DllGetClassObject
DllRegisterServer
Static task
static1
Behavioral task
behavioral1
Sample
049e2614702d3cbdc86a31c3fbec7df5_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
049e2614702d3cbdc86a31c3fbec7df5_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
049e2614702d3cbdc86a31c3fbec7df5_JaffaCakes118
Size
160KB
MD5
049e2614702d3cbdc86a31c3fbec7df5
SHA1
f87770654e7cd66c864be1535a76d2c3a57a65da
SHA256
a83f4bfc10b95289a6faff479fe768bd06ff804feb346022de6fbad9f36f7266
SHA512
a184750e7ab03f12c4fa02ce66c0ed9f11d787ce3cd046e703cb96f8b79597db75f9d2c188ba0c2074c49b128d767d10cb50864fe5c517c2c2a5d004dcd7f741
SSDEEP
3072:KptFydYe/+RQrWEvJajr4SEKm+OOa8P4a3crUUfOm:cFydV/9rW8icvKmvOa8P4a3crUUf
Checks for missing Authenticode signature.
resource |
---|
049e2614702d3cbdc86a31c3fbec7df5_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
?GetExeFolder@@YA?AVCString@@XZ
??1CQQDataArrayHelper@@UAE@XZ
??_7CQQDataArrayHelper@@6B@
?CheckFileExist1@@YAHVCString@@@Z
?GetQQDataStr@@YAJPAUIQQData@@PBDAAVCString@@@Z
?Base64Encode@@YA?AVCString@@PBDH@Z
?CheckForUinNeedUpdate@@YAHPAUIQQCore@@VCString@@@Z
?PtrArrayToQQArray@@YAJABVCPtrArray@@PAPAUIQQDataArray@@@Z
?FreeQQPtrArray@@YAJAAVCPtrArray@@@Z
?MinimizeMemory@@YAXXZ
?QQArrayToPtrArray@@YAJPAUIQQDataArray@@AAVCPtrArray@@@Z
?CreateQQData@@YAXPAPAUIQQData@@@Z
?GetSecurityText@CSecurityEdit@@QAE?AVCString@@XZ
?SetLabelBkgColorSel@CQQTabCtrl@@QAEXK@Z
?Clear@CSecurityEdit@@QAEXXZ
?SetTabBkgColor@CQQTabCtrl@@QAEXK@Z
?InsertChar@CSecurityEdit@@QAEXD@Z
?SetBorderColor@CQQTabCtrl@@QAEXK@Z
??0CComboBoxXP@@QAE@XZ
??0CQQTabCtrl@@QAE@XZ
??0CSecurityEdit@@QAE@XZ
??1CComboBoxXP@@UAE@XZ
??1CQQTabCtrl@@UAE@XZ
??1CSecurityEdit@@UAE@XZ
??1CBorderEdit@@UAE@XZ
?SetButtonBmp@CQQTabCtrl@@QAEXPAVCDib@@00@Z
??0CBorderEdit@@QAE@XZ
?LoadDib@CSkinButtonEx@@SAXXZ
?IsHostingConfigValid@@YAHXZ
?CheckEmailValid@@YAHVCString@@@Z
?PaintTileButtonEx@@YAXPAVCDC@@PAVCDib@@VCRect@@HH@Z
?Serialize@CDib@@UAEXAAVCArchive@@@Z
?ReadFromResource@CDib@@QAEHIPBD@Z
?GetQQPath@@YAHPAD0AAVCString@@@Z
?OpenUrlWithTe@@YAXPAUHWND__@@VCString@@H@Z
??0CSkinButtonEx@@QAE@XZ
??1CDib@@UAE@XZ
?CheckMobileValid@@YAHVCString@@@Z
??1CSkinButtonEx@@UAE@XZ
?CheckQQUinValid@@YAHVCString@@@Z
?GetHostingConfig@@YAHPBDAAVCString@@@Z
??0CDib@@QAE@XZ
?GetRuntimeClass@CDib@@UBEPAUCRuntimeClass@@XZ
InternetQueryOptionA
ord4079
ord2370
ord2301
ord4698
ord5307
ord6375
ord269
ord826
ord600
ord1578
ord1255
ord1253
ord1570
ord1116
ord1176
ord3663
ord3573
ord3626
ord5265
ord4376
ord4998
ord2514
ord6052
ord4078
ord1775
ord4407
ord5241
ord2385
ord5163
ord6374
ord4353
ord5280
ord3798
ord4837
ord4441
ord2648
ord2055
ord6376
ord3749
ord5065
ord1727
ord5261
ord2446
ord2124
ord5277
ord2982
ord3147
ord3259
ord4465
ord3136
ord3262
ord2985
ord3081
ord2976
ord3830
ord3831
ord3825
ord3079
ord4080
ord4627
ord4425
ord3597
ord800
ord641
ord2614
ord1154
ord540
ord324
ord825
ord2414
ord2302
ord4234
ord3619
ord6199
ord3092
ord939
ord922
ord4129
ord5710
ord2818
ord4160
ord1641
ord4710
ord4853
ord3874
ord4476
ord6055
ord1776
ord5290
ord3402
ord4424
ord3721
ord795
ord818
ord1168
ord860
ord567
ord858
ord4275
ord2379
ord535
ord5875
ord2358
ord6334
ord823
ord1799
ord4622
ord614
ord290
ord6467
ord4226
ord4003
ord446
ord743
ord2727
ord2730
ord2729
ord926
ord941
ord537
ord4274
ord1575
ord4486
ord2554
ord2512
ord5731
ord3922
ord1089
ord5199
ord2396
ord3346
ord5300
ord5302
ord2725
ord1197
ord5440
ord6383
ord5289
ord5714
ord3738
ord815
ord561
ord5500
ord1132
ord1131
ord6354
ord3571
ord772
ord500
ord1114
ord3258
ord1243
ord342
ord2298
ord6215
ord6785
ord1768
ord6197
ord6380
ord4284
ord6241
ord2817
ord1146
ord3317
ord5981
ord2864
ord6283
ord2642
ord2086
ord5606
ord2859
ord2764
ord4224
ord4299
ord3089
ord5951
ord5953
ord2860
ord1113
ord1669
ord2652
ord1200
ord1228
ord5450
ord6394
ord2567
ord6453
ord2915
ord538
ord5572
ord2763
ord6648
ord6662
ord2575
ord4396
ord3574
ord609
ord2299
ord6282
ord859
ord283
ord3742
ord1233
ord755
ord640
ord2405
ord5785
ord1640
ord323
ord470
ord1182
ord1577
ord2754
time
atol
atoi
_mbscmp
memcpy
strcat
strlen
memset
rand
srand
__CxxFrameHandler
__dllonexit
_onexit
_except_handler3
?terminate@@YAXXZ
free
_initterm
malloc
_adjust_fdiv
??1type_info@@UAE@XZ
LocalAlloc
LocalFree
GlobalFree
GetTempPathA
WritePrivateProfileStringA
GetDC
FillRect
CopyRect
InvalidateRect
PostMessageA
GetFocus
GetSystemMetrics
GetWindowRect
GetSysColor
ReleaseDC
GetWindow
GetWindowDC
ScreenToClient
GetClientRect
GetMessagePos
LoadIconA
LoadImageA
SetCursor
ShowCursor
EnableWindow
SendMessageA
MessageBoxA
PtInRect
KillTimer
LoadCursorA
CreateCompatibleBitmap
CreateCompatibleDC
BitBlt
SetPixel
GetObjectA
CreateFontIndirectA
GetStockObject
CreateSolidBrush
CreateFontA
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
ShellExecuteA
CoTaskMemFree
CoCreateGuid
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ