DllCanUnloadNow
DllEnumClassObjects
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
05816467dd56743675d861ebc62fff6a_JaffaCakes118.dll
Resource
win7-20240903-en
Target
05816467dd56743675d861ebc62fff6a_JaffaCakes118
Size
192KB
MD5
05816467dd56743675d861ebc62fff6a
SHA1
1ffa5fe96cdac1d9b9c5a32e98e88efe221cd838
SHA256
fc323b9d9dfc16cd4be5fd8e5f4fbcfb74fb263cb94429e7cc6ad58ec65311b0
SHA512
2d1b0c2be8499bf39d2bead96f8eb2f779e7db593fa375db4966dd20239a1529a46d45aae30194c0ae914f7378b08a8e940f6157ef7f9b326496118191ada4e9
SSDEEP
6144:vfVkiKuhzfniveiPniJ0577AUNT1AQjPML:XVNKWfniveivikAE1poL
Checks for missing Authenticode signature.
resource |
---|
05816467dd56743675d861ebc62fff6a_JaffaCakes118 |
IMAGE_DLLCHARACTERISTICS_NO_BIND
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
RestoreDC
SetViewportOrgEx
SetWindowOrgEx
SetMapMode
SaveDC
LPtoDP
DeleteDC
GetDeviceCaps
GetTickCount
LeaveCriticalSection
EnterCriticalSection
GetUserDefaultLangID
GetProcAddress
LoadLibraryA
DeleteCriticalSection
FreeLibrary
GetACP
InterlockedDecrement
InterlockedIncrement
MultiByteToWideChar
lstrlenA
SizeofResource
WideCharToMultiByte
LoadLibraryW
DisableThreadLibraryCalls
HeapDestroy
InitializeCriticalSection
GetCurrentThreadId
FlushInstructionCache
GetCurrentProcess
HeapSize
HeapAlloc
HeapFree
HeapReAlloc
VirtualAlloc
VirtualFree
GetProcessHeap
ExitProcess
TerminateProcess
RtlUnwind
GetLastError
LoadResource
wsprintfW
ReleaseDC
GetFocus
SetFocus
IsChild
InvalidateRect
ShowWindow
GetParent
DestroyWindow
GetDC
RegCloseKey
SysStringLen
LoadTypeLi
VariantCopy
OleCreatePropertyFrame
SysFreeString
RegisterTypeLi
VarUI4FromStr
SysAllocString
VariantInit
VariantClear
LoadRegTypeLi
CoCreateInstance
OleRegGetMiscStatus
CreateOleAdviseHolder
OleRegGetUserType
OleRegEnumVerbs
CoTaskMemRealloc
CoTaskMemAlloc
CreateBindCtx
CoTaskMemFree
PathAddBackslashW
ord125
PathRemoveFileSpecW
ord45
StrCmpIW
ord55
ord94
ord141
ord37
ord102
ord314
ord315
ord366
StrCmpNIW
StrCatBuffW
PathAppendW
StrCpyNW
ord56
SHQueryValueExW
wnsprintfW
ord126
ord48
StrCpyW
StrCatW
ord105
ord66
ord80
ord130
ord361
ord83
ord123
ord40
ord121
ord120
ord347
DllCanUnloadNow
DllEnumClassObjects
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE