DllCanUnloadNow
DllGetClassObject
IAlloc
QueueMemory
Static task
static1
Behavioral task
behavioral1
Sample
0a31e3e15b178a7a3f88710a50e40725_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0a31e3e15b178a7a3f88710a50e40725_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
0a31e3e15b178a7a3f88710a50e40725_JaffaCakes118
Size
1.3MB
MD5
0a31e3e15b178a7a3f88710a50e40725
SHA1
6279e37d1e7e7ac38c576e44586faccf08c1c9fa
SHA256
e1d31ad0409cf82842e04d500c8599d3e8ce96f6fc6731efd514123aa88f2f9a
SHA512
eb06251411cd418ab5679c8c4d5fc0f6e6d0887cd2a7711bf626855d4128dc15f5cde07e65524d156a1f62861cef78c99ffad95cab8b7822884c663e25aaee2b
SSDEEP
12288:H5RhRR9L1TIVNdWa+xCGh+q5PP35WzKuRHKd5j:hfcECA+qtPCZUj
Checks for missing Authenticode signature.
resource |
---|
0a31e3e15b178a7a3f88710a50e40725_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetComputerNameA
GetACP
OpenProcess
DuplicateHandle
GetCurrentThread
ReleaseMutex
CreateMutexA
FlushFileBuffers
lstrcmpiA
CreateRemoteThread
WriteProcessMemory
VirtualAllocEx
WaitForMultipleObjects
OpenEventA
CreateProcessA
FormatMessageA
ResetEvent
GetVersionExA
RemoveDirectoryA
TerminateProcess
DeviceIoControl
FileTimeToSystemTime
FileTimeToLocalFileTime
LocalFree
GetWindowsDirectoryA
GetShortPathNameA
CreateDirectoryA
GetFullPathNameA
GetTimeZoneInformation
CompareStringW
CompareStringA
SetStdHandle
IsBadCodePtr
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
GetStringTypeW
GetStringTypeA
GetOEMCP
GetCPInfo
VirtualAlloc
VirtualFree
GetEnvironmentVariableA
HeapSize
HeapReAlloc
SetUnhandledExceptionFilter
UnhandledExceptionFilter
LCMapStringW
LCMapStringA
ExitProcess
TlsFree
TlsAlloc
GetCommandLineA
GetSystemTimeAsFileTime
RaiseException
GetDriveTypeA
ExitThread
TlsGetValue
TlsSetValue
CreateThread
RtlUnwind
GetSystemTime
GetLocalTime
GetCurrentProcess
GetVolumeInformationA
HeapDestroy
HeapCreate
HeapFree
SetEnvironmentVariableA
HeapAlloc
GetModuleFileNameA
MultiByteToWideChar
WideCharToMultiByte
IsBadReadPtr
IsBadWritePtr
lstrlenA
InterlockedDecrement
GetCurrentProcessId
DisableThreadLibraryCalls
SetLastError
GetFileTime
SetFileTime
OutputDebugStringA
CreateFileMappingA
MapViewOfFile
UnmapViewOfFile
SetEndOfFile
SetThreadPriority
SetFileAttributesA
GetFileSize
GetCurrentDirectoryA
SetCurrentDirectoryA
FindFirstFileA
FindNextFileA
FindClose
TerminateThread
GetModuleHandleA
GetCurrentThreadId
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
GetDiskFreeSpaceA
GetLastError
SetEvent
InterlockedIncrement
Sleep
LoadLibraryA
GetProcAddress
FreeLibrary
CreateEventA
ResumeThread
WaitForSingleObject
MoveFileA
DeleteFileA
GetVersion
GetSystemDirectoryA
WriteFile
CreateFileA
ReadFile
SetFilePointer
CloseHandle
GetTickCount
VirtualProtect
SetWindowLongA
ExitWindowsEx
GetWindowTextA
GetSystemMetrics
PostMessageA
RegisterHotKey
PostQuitMessage
GetWindowTextLengthA
GetKeyboardLayout
CreatePopupMenu
AppendMenuA
TrackPopupMenu
DestroyMenu
SetTimer
LoadIconA
GetKeyNameTextA
GetKeyState
GetAsyncKeyState
EnumWindows
GetForegroundWindow
UnregisterHotKey
IsWindow
UnregisterClassA
DestroyWindow
LoadImageA
DispatchMessageA
TranslateMessage
ToAsciiEx
GetDesktopWindow
GetProcessWindowStation
OpenWindowStationA
SetProcessWindowStation
FindWindowA
GetWindowThreadProcessId
CloseWindowStation
SetThreadDesktop
OpenDesktopA
GetThreadDesktop
OpenInputDesktop
GetUserObjectInformationA
CloseDesktop
LoadCursorA
MessageBoxA
LoadStringA
SendMessageA
SetDlgItemTextA
SetPropA
SetForegroundWindow
EndDialog
DialogBoxParamA
GetClassNameA
GetWindowRect
PostThreadMessageA
GetDC
ReleaseDC
KillTimer
GetCursorPos
wsprintfA
GetWindowLongA
DefWindowProcA
RegisterClassA
CreateWindowExA
GetMessageA
GetDeviceCaps
CreateCompatibleDC
CreateDCA
DeleteObject
SelectObject
DeleteDC
CreateDIBSection
GdiFlush
BitBlt
CreateCompatibleBitmap
GetStockObject
InitiateSystemShutdownA
OpenSCManagerA
OpenServiceA
CloseServiceHandle
DeleteService
LogonUserA
RegDeleteKeyA
RegDeleteValueA
RegEnumValueA
RegEnumKeyExA
RegOpenKeyExA
LookupPrivilegeValueA
AdjustTokenPrivileges
RevertToSelf
GetSidLengthRequired
GetTokenInformation
LookupAccountSidA
ImpersonateLoggedOnUser
DuplicateToken
OpenProcessToken
GetUserNameA
RegCreateKeyExA
RegQueryValueExA
RegSetValueExA
RegCloseKey
SHGetSpecialFolderLocation
SHGetPathFromIDListA
SHGetMalloc
ShellExecuteA
Shell_NotifyIconA
SHLoadInProc
CoTaskMemFree
StringFromCLSID
CoCreateInstance
CoUninitialize
CoInitialize
SysFreeString
SysAllocStringLen
DllCanUnloadNow
DllGetClassObject
IAlloc
QueueMemory
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ