DllCanUnloadNow
DllGetClassObject
IAlloc
QueueMemory
Static task
static1
Behavioral task
behavioral1
Sample
09b78d89dc84f4c914adccb9f9a59a85_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
09b78d89dc84f4c914adccb9f9a59a85_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
09b78d89dc84f4c914adccb9f9a59a85_JaffaCakes118
Size
744KB
MD5
09b78d89dc84f4c914adccb9f9a59a85
SHA1
9aa73c1fe491b2ad26029e1e6a756b95514e7cb9
SHA256
f52e4da2ad5806d28f4afd6123b4aab22164808b18ba25a8c65b4fdb41d8831c
SHA512
bd4caae2231ef2c671e0499a84e16415727142449170b33a1de3f1587c5c63f038c288b085b4e9c8bd9aecd9b120f8b824986851f290ec9dc8af94330f83913a
SSDEEP
12288:lJvBLqfVirXMG0qPU53Y3LFVnb63aT97jT+w5HC:r5qgB0K3pVb1xxHC
Checks for missing Authenticode signature.
resource |
---|
09b78d89dc84f4c914adccb9f9a59a85_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetACP
OpenProcess
DuplicateHandle
GetCurrentThread
ReleaseMutex
CreateMutexA
lstrcmpiA
CreateRemoteThread
WriteProcessMemory
VirtualAllocEx
FormatMessageA
ResetEvent
GetVolumeInformationA
GetVersionExA
RemoveDirectoryA
FileTimeToSystemTime
FileTimeToLocalFileTime
LocalFree
GetWindowsDirectoryA
GetShortPathNameA
CreateDirectoryA
GetFullPathNameA
SetEnvironmentVariableA
CompareStringW
GetComputerNameA
FlushFileBuffers
SetStdHandle
IsBadCodePtr
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
GetStringTypeW
GetStringTypeA
VirtualAlloc
VirtualFree
GetEnvironmentVariableA
HeapSize
HeapReAlloc
SetUnhandledExceptionFilter
LCMapStringW
LCMapStringA
UnhandledExceptionFilter
TerminateProcess
GetOEMCP
GetCPInfo
ExitProcess
TlsFree
TlsAlloc
GetCommandLineA
GetSystemTimeAsFileTime
RaiseException
GetSystemTime
ExitThread
TlsGetValue
TlsSetValue
CreateThread
RtlUnwind
GetTimeZoneInformation
GetLocalTime
GetCurrentProcess
HeapDestroy
HeapCreate
HeapFree
GetDriveTypeA
HeapAlloc
OutputDebugStringA
GetModuleFileNameA
MultiByteToWideChar
WideCharToMultiByte
IsBadReadPtr
IsBadWritePtr
lstrlenA
InterlockedDecrement
GetCurrentProcessId
DisableThreadLibraryCalls
SetLastError
GetFileTime
SetFileTime
WriteFile
CreateFileMappingA
MapViewOfFile
UnmapViewOfFile
SetFilePointer
SetEndOfFile
SetThreadPriority
SetFileAttributesA
GetCurrentDirectoryA
SetCurrentDirectoryA
FindFirstFileA
GetFileSize
FindNextFileA
FindClose
CreateFileA
ReadFile
TerminateThread
GetModuleHandleA
GetCurrentThreadId
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
GetDiskFreeSpaceA
GetLastError
SetEvent
InterlockedIncrement
Sleep
LoadLibraryA
GetProcAddress
FreeLibrary
CreateEventA
ResumeThread
WaitForSingleObject
CloseHandle
MoveFileA
GetTickCount
DeleteFileA
GetVersion
CompareStringA
GetSystemDirectoryA
ExitWindowsEx
MessageBoxA
EnumDisplaySettingsA
UnregisterHotKey
PostQuitMessage
GetKeyboardLayout
ToAsciiEx
AppendMenuA
TrackPopupMenu
DestroyMenu
LoadImageA
SetTimer
LoadIconA
SetWindowLongA
PostMessageA
GetForegroundWindow
IsWindow
UnregisterClassA
DestroyWindow
DispatchMessageA
TranslateMessage
GetMessageA
RegisterHotKey
LoadCursorA
GetKeyNameTextA
GetKeyState
GetAsyncKeyState
EnumWindows
GetDesktopWindow
GetProcessWindowStation
OpenWindowStationA
SetProcessWindowStation
FindWindowA
GetWindowThreadProcessId
CloseWindowStation
SetThreadDesktop
OpenDesktopA
GetThreadDesktop
OpenInputDesktop
GetUserObjectInformationA
CloseDesktop
LoadStringA
SendMessageA
SetDlgItemTextA
SetPropA
SetForegroundWindow
EndDialog
DialogBoxParamA
GetClassNameA
GetWindowRect
PostThreadMessageA
GetDC
ReleaseDC
KillTimer
GetCursorPos
wsprintfA
GetWindowLongA
DefWindowProcA
RegisterClassA
CreateWindowExA
CreatePopupMenu
GetDeviceCaps
CreateCompatibleDC
CreateDCA
DeleteObject
SelectObject
DeleteDC
CreateDIBSection
GdiFlush
BitBlt
CreateCompatibleBitmap
GetStockObject
InitiateSystemShutdownA
OpenSCManagerA
OpenServiceA
CloseServiceHandle
DeleteService
LogonUserA
RegDeleteKeyA
RegDeleteValueA
RegEnumValueA
RegEnumKeyExA
RegOpenKeyExA
LookupPrivilegeValueA
AdjustTokenPrivileges
RevertToSelf
GetSidLengthRequired
GetTokenInformation
LookupAccountSidA
ImpersonateLoggedOnUser
DuplicateToken
OpenProcessToken
GetUserNameA
RegCreateKeyExA
RegQueryValueExA
RegSetValueExA
RegCloseKey
SHGetPathFromIDListA
SHGetMalloc
ShellExecuteA
Shell_NotifyIconA
SHLoadInProc
SHGetSpecialFolderLocation
CoTaskMemFree
CoInitialize
CoUninitialize
StringFromCLSID
CoCreateInstance
DllCanUnloadNow
DllGetClassObject
IAlloc
QueueMemory
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ