DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
cfi_Inject
cfi_StartHook
cfi_StopHook
Static task
static1
Behavioral task
behavioral1
Sample
06f3ecec201f5d90eb4a349a23d6117d_JaffaCakes118.dll
Resource
win7-20240903-en
Target
06f3ecec201f5d90eb4a349a23d6117d_JaffaCakes118
Size
192KB
MD5
06f3ecec201f5d90eb4a349a23d6117d
SHA1
83dbf1c499b1129d6385bd066fd39072ee0e4d06
SHA256
7b818520a2eeba59bc4037130f24a2deba3482c4fb173c30498fc9d93f4e801e
SHA512
62d8e6cab97259af42df0f487b8cc93193fc4d413b029ef1c14a8bb46a3620f103f9ccc433f704be6e84af66db3b81988ee23a86fff9f89038bf82464d0f22c6
SSDEEP
3072:p9NkAs3vNMzIduJ0fUq1mp5WeT9u7dlHsNr/r:HNkAsFSlqYjWH7O
Checks for missing Authenticode signature.
resource |
---|
06f3ecec201f5d90eb4a349a23d6117d_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
SetEndOfFile
GetOEMCP
GetACP
SetFilePointer
FlushFileBuffers
SetStdHandle
GetStringTypeW
GetStringTypeA
GetCPInfo
IsBadCodePtr
IsBadReadPtr
SetUnhandledExceptionFilter
WriteFile
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetFileType
GetStdHandle
SetHandleCount
IsBadWritePtr
VirtualAlloc
VirtualFree
HeapCreate
ReadFile
HeapSize
TerminateProcess
LCMapStringW
LCMapStringA
ExitProcess
TlsGetValue
SetLastError
TlsFree
TlsAlloc
TlsSetValue
GetVersion
GetCommandLineA
HeapReAlloc
HeapAlloc
RtlUnwind
InterlockedExchange
Sleep
UnmapViewOfFile
CreateFileA
CreateFileMappingA
MapViewOfFile
WinExec
IsDBCSLeadByte
LoadLibraryExA
FindResourceA
LoadResource
SizeofResource
HeapDestroy
InterlockedIncrement
DeleteCriticalSection
InitializeCriticalSection
DisableThreadLibraryCalls
CreateMutexA
GetLastError
GetShortPathNameA
FreeLibrary
FindFirstFileW
FindNextFileW
FindClose
ExpandEnvironmentStringsW
LocalFree
lstrcatW
GetModuleFileNameW
LoadLibraryW
lstrcmpiW
lstrcpynW
lstrlenW
GetProcessHeap
HeapFree
WriteProcessMemory
CreateToolhelp32Snapshot
Module32First
Module32Next
lstrlenA
lstrcmpiA
GetCurrentProcessId
CloseHandle
OpenProcess
GetModuleFileNameA
lstrcatA
GetSystemDefaultLangID
GetPrivateProfileIntA
GetPrivateProfileStringA
lstrcpyW
lstrcmpA
lstrcpyA
WideCharToMultiByte
MultiByteToWideChar
lstrcpynA
GetModuleHandleA
GetVersionExA
InterlockedDecrement
EnterCriticalSection
LeaveCriticalSection
GetCurrentProcess
FlushInstructionCache
GetCurrentThreadId
LoadLibraryA
GetProcAddress
GetStartupInfoA
SetWindowTextA
GetCursorPos
SetTimer
UpdateWindow
DefWindowProcA
IsWindow
GetWindowRect
GetDlgCtrlID
GetWindowTextW
GetWindowTextLengthW
SetWindowTextW
PostMessageW
SendMessageW
DrawTextW
FindWindowExW
LoadImageW
LoadIconW
FindWindowW
GetClassNameW
SetWindowsHookExW
wsprintfW
CharNextA
DrawIconEx
GetWindowDC
LoadImageA
GetWindowThreadProcessId
FillRect
GetFocus
LoadIconA
DestroyIcon
FindWindowExA
GetSysColor
SendMessageA
GetWindowTextLengthA
SetFocus
LoadBitmapA
CallWindowProcW
SetWindowLongW
GetClassNameA
GetParent
GetWindowLongW
FindWindowA
GetSystemMetrics
GetClassInfoExA
LoadCursorA
wsprintfA
RegisterClassExA
ReleaseDC
EndPaint
CreateWindowExA
CallWindowProcA
GetWindowLongA
SetWindowLongA
CallNextHookEx
UnhookWindowsHookEx
SetWindowsHookExA
ReleaseCapture
SetCapture
PtInRect
GetDC
InflateRect
BeginPaint
SystemParametersInfoA
ShowWindow
PostMessageA
MoveWindow
SetWindowRgn
ScreenToClient
OffsetRect
SetRectEmpty
GetClientRect
DrawFrameControl
GetWindowTextA
DrawTextA
IsRectEmpty
CopyRect
KillTimer
SetStretchBltMode
StretchBlt
ExtTextOutA
GetStockObject
GetObjectA
CreateFontIndirectA
DeleteObject
SetBkColor
SelectObject
CreateCompatibleDC
SetTextColor
SetBkMode
FrameRgn
OffsetRgn
CreateSolidBrush
ExcludeClipRect
SetWindowOrgEx
GetClipBox
BitBlt
EqualRgn
CombineRgn
CreateRectRgn
CreatePolygonRgn
SetViewportOrgEx
GetViewportOrgEx
SetPixel
GetTextExtentPoint32A
GetTextExtentPointA
GetTextExtentPoint32W
GetTextExtentPointW
DeleteDC
CreateCompatibleBitmap
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
RegQueryInfoKeyA
RegEnumValueA
RegSetValueExA
RegCreateKeyExA
RegDeleteKeyA
RegQueryValueExW
RegEnumKeyExW
RegQueryInfoKeyW
RegOpenKeyExW
RegDeleteValueA
RegDeleteKeyW
RegCreateKeyExW
RegSetValueExW
RegEnumValueW
RegEnumKeyExA
SHGetDesktopFolder
SHGetSpecialFolderPathW
SHGetMalloc
SHGetSpecialFolderLocation
ShellExecuteA
CoTaskMemAlloc
CoFreeUnusedLibraries
CoInitialize
CoCreateInstance
CoUninitialize
CoTaskMemFree
CoTaskMemRealloc
RegisterTypeLi
LoadTypeLi
SysAllocString
SysFreeString
OleTranslateColor
SysStringLen
VarUI4FromStr
LoadRegTypeLi
UrlApplySchemeW
StrRetToBufW
PathIsURLW
StrCpyW
StrDupW
StrStrW
StrStrIW
StrStrA
StrStrIA
StrCmpW
StrRStrIW
PathFileExistsW
PathIsDirectoryW
StrCmpNIW
StrDupA
PathAppendA
PathRemoveFileSpecA
StrNCatW
StrCmpIW
InternetCrackUrlW
ImageList_AddMasked
ImageList_Create
ImageList_Draw
ImageList_SetBkColor
ImageList_GetIconSize
ImageList_ReplaceIcon
ImageList_Remove
ImageList_Destroy
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
cfi_Inject
cfi_StartHook
cfi_StopHook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ