DllCanUnloadNow
DllDispHook
DllGetClassObject
DllMain
DllSetHook
_DllSetHook@4
Static task
static1
Behavioral task
behavioral1
Sample
07390a2d0da66b54a95bb490a7da9ad9_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
07390a2d0da66b54a95bb490a7da9ad9_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
07390a2d0da66b54a95bb490a7da9ad9_JaffaCakes118
Size
409KB
MD5
07390a2d0da66b54a95bb490a7da9ad9
SHA1
ca2289982380ee0f6e9d8ba4de0606283f5e73c5
SHA256
11dd5a644e873003d90b45f822e205a29520bbbdaac4e62b05b7dd2315d21514
SHA512
b0570531d40945520ae7b2770375e98d8fe6ef21b322efc6fcaeffa70128524456bd3e09a7c957f95cfd06e0781a58c12a8a02b2d6aca766beb339bb7dee17fc
SSDEEP
12288:ULb03fJ0U4X6kP2F6/kf90ZTUW0i2xRS8uuok2:ULgJ0N6y46/kfKZTfr2+wok2
Checks for missing Authenticode signature.
resource |
---|
07390a2d0da66b54a95bb490a7da9ad9_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
FindResourceExA
WideCharToMultiByte
GetLastError
FindFirstChangeNotificationA
FindCloseChangeNotification
FindFirstFileA
FindNextFileA
FindClose
CreateFileA
IsBadWritePtr
ReleaseMutex
CreateFileMappingA
MapViewOfFile
CreateMutexA
UnmapViewOfFile
Sleep
GetCurrentProcessId
GetShortPathNameA
lstrlenA
IsBadReadPtr
GetProcessHeap
HeapFree
HeapAlloc
GetComputerNameA
GetSystemInfo
VirtualQuery
lstrcpyA
MultiByteToWideChar
LoadResource
SetUnhandledExceptionFilter
FlushFileBuffers
SetStdHandle
GetStringTypeW
GetStringTypeA
SetFilePointer
RtlUnwind
GetSystemTimeAsFileTime
GetTickCount
QueryPerformanceCounter
WriteFile
UnhandledExceptionFilter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
LCMapStringW
LCMapStringA
GetCPInfo
GetOEMCP
IsBadCodePtr
VirtualFree
HeapCreate
TerminateProcess
GetModuleHandleA
ExitProcess
GetCommandLineA
VirtualAlloc
VirtualProtect
HeapSize
LockResource
SizeofResource
FindResourceA
CreateEventA
WaitForSingleObject
CreateThread
CloseHandle
GetCurrentThread
GetCurrentProcess
DuplicateHandle
WaitForMultipleObjects
SetEvent
OpenEventA
GetCurrentThreadId
FreeLibraryAndExitThread
GetModuleFileNameA
FreeLibrary
GetProcAddress
LoadLibraryA
RaiseException
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
InterlockedDecrement
InterlockedIncrement
DisableThreadLibraryCalls
HeapReAlloc
HeapDestroy
CallWindowProcW
IsWindowUnicode
IsWindow
EnumWindows
CallWindowProcA
MsgWaitForMultipleObjects
SendMessageA
FindWindowA
GetMessageW
GetMessageA
DispatchMessageW
UnhookWindowsHookEx
SetWindowsHookExA
PostThreadMessageA
SendMessageTimeoutA
RegisterWindowMessageA
EnumChildWindows
GetClassNameA
DispatchMessageA
TranslateMessage
PeekMessageA
MsgWaitForMultipleObjectsEx
GetWindowThreadProcessId
GetParent
CallNextHookEx
SetWindowLongA
SetWindowLongW
GetWindowLongA
GetWindowLongW
EqualPrefixSid
RegSetValueExA
RegCreateKeyExA
RegDeleteValueA
RegEnumValueA
RegNotifyChangeKeyValue
GetTokenInformation
LookupPrivilegeValueA
AdjustTokenPrivileges
OpenProcessToken
SetNamedSecurityInfoA
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
IsValidSid
GetLengthSid
CopySid
GetSidSubAuthority
GetSidLengthRequired
InitializeSid
GetSecurityDescriptorControl
MakeAbsoluteSD
GetSecurityDescriptorDacl
InitializeSecurityDescriptor
GetAclInformation
InitializeAcl
AddAce
SetSecurityDescriptorDacl
GetSecurityDescriptorOwner
GetSecurityDescriptorGroup
GetSecurityDescriptorSacl
GetUserNameA
CoUninitialize
CoInitialize
CLSIDFromProgID
CoCreateInstance
VariantClear
DispCallFunc
VariantInit
PathAddBackslashA
SHSetValueA
SHDeleteValueA
StrStrIA
SHDeleteKeyA
PathStripPathA
PathRemoveFileSpecA
DllCanUnloadNow
DllDispHook
DllGetClassObject
DllMain
DllSetHook
_DllSetHook@4
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ