DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
0a12845846ad3fb0e24fb606fb99eb7a_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
0a12845846ad3fb0e24fb606fb99eb7a_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
0a12845846ad3fb0e24fb606fb99eb7a_JaffaCakes118
Size
189KB
MD5
0a12845846ad3fb0e24fb606fb99eb7a
SHA1
284056e5f47e63e5230bff2c5d99bbefa60e20f8
SHA256
af09edd9388e96b7ea29265ea1ad19426eb59acaaa872f0593d4b1cf6b537c10
SHA512
30a3fd9d2294f66f27fbdc4a0098a51327ce3f8879c2fd329270974b02df962669e939dff6c4896775a6dde56a85f8f9e53644e813d9f939e58783f4ad06e664
SSDEEP
3072:0O3G2Jf8R+QbKvCkpkkkkkkOVUwoyRkLVKA4lcAByMo9vAeQS4fVib6SmG+W+Q7m:Abu4UuOJKAuBXi6dfVkxmxQDP+
Checks for missing Authenticode signature.
resource |
---|
0a12845846ad3fb0e24fb606fb99eb7a_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
MultiByteToWideChar
lstrlenA
SizeofResource
LoadResource
FindResourceW
GetLastError
LoadLibraryExW
lstrcmpiW
lstrcpynW
DisableThreadLibraryCalls
InitializeCriticalSection
HeapDestroy
DeleteCriticalSection
lstrcpyW
lstrcatW
InterlockedIncrement
GetCurrentThreadId
FreeLibrary
GlobalFindAtomW
GetEnvironmentStrings
WideCharToMultiByte
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetStringTypeW
GetStringTypeA
GetModuleFileNameW
GetModuleHandleW
GetShortPathNameW
EnterCriticalSection
LeaveCriticalSection
lstrlenW
GetCurrentProcess
FlushInstructionCache
GlobalAddAtomW
InterlockedDecrement
LCMapStringW
LCMapStringA
IsBadCodePtr
LoadLibraryA
GetProcAddress
GetOEMCP
GetACP
GetCPInfo
SetUnhandledExceptionFilter
WriteFile
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
TerminateProcess
SetLastError
TlsFree
TlsAlloc
LocalFree
HeapFree
HeapAlloc
HeapReAlloc
TlsSetValue
TlsGetValue
GetCommandLineA
GetVersion
RaiseException
GetModuleHandleA
GetModuleFileNameA
GetEnvironmentVariableA
GetVersionExA
HeapCreate
VirtualFree
VirtualAlloc
ExitProcess
RtlUnwind
GetEnvironmentStringsW
KillTimer
CallWindowProcW
CharNextW
SetTimer
DefWindowProcW
GetWindowLongW
SetWindowLongW
GetClassInfoExW
LoadCursorW
wsprintfW
RegisterClassExW
CreateWindowExW
ShowWindow
GetClientRect
IsWindow
RegQueryInfoKeyW
RegSetValueExW
RegEnumKeyExW
RegOpenKeyExW
RegCloseKey
RegDeleteValueW
RegCreateKeyExW
RegDeleteKeyW
RegEnumValueW
SHLoadInProc
StrStrIW
CoTaskMemAlloc
CoTaskMemRealloc
CoCreateInstance
StringFromGUID2
CoInitialize
OleRun
CoTaskMemFree
LoadTypeLi
RegisterTypeLi
VarUI4FromStr
SysStringLen
LoadRegTypeLi
DispCallFunc
VariantClear
SysAllocString
SysFreeString
GetErrorInfo
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ