DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
0bfb965b8c2086940a912170cadaafff_JaffaCakes118.dll
Resource
win7-20240903-en
Target
0bfb965b8c2086940a912170cadaafff_JaffaCakes118
Size
217KB
MD5
0bfb965b8c2086940a912170cadaafff
SHA1
573bbbe665eb27d09eeb1e4ecf7b9132b63f59ce
SHA256
217b754ad34b0190763940ab21946dfcd761f6bdabe1716e1551368a46e88a8b
SHA512
21486d02084cb36bcab6beffc77b5b97690a4638d59719281167fe803d11149df626c7955923c73121826d253e2ab0face2da70acdffd4909965c062843e91eb
SSDEEP
1536:MyhGnu9CVmAODAOrUspaFltFpI60qHVf4flKoTIzZdgOj1qlpJ:MywL0kOrUspaFltP0qoUdJ1ql
Checks for missing Authenticode signature.
resource |
---|
0bfb965b8c2086940a912170cadaafff_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
lstrlenA
SizeofResource
LoadResource
FindResourceW
GetLastError
LoadLibraryExW
lstrcpynW
lstrcpyW
lstrcatW
GetLocalTime
Sleep
CreateFileA
GetTempPathA
OutputDebugStringW
FlushFileBuffers
WriteFile
DeleteFileA
DeviceIoControl
OutputDebugStringA
WideCharToMultiByte
IsBadReadPtr
MultiByteToWideChar
GetProcAddress
GetModuleHandleA
GetCurrentProcess
DebugBreak
SetErrorMode
OpenEventA
ExitProcess
LoadLibraryA
GetWindowsDirectoryA
VirtualAlloc
VirtualFree
LocalFree
SetStdHandle
GetOEMCP
GetACP
GetCPInfo
lstrcmpiW
FreeLibrary
GetModuleFileNameW
GetModuleHandleW
GetShortPathNameW
lstrlenW
InterlockedDecrement
InterlockedIncrement
EnterCriticalSection
LeaveCriticalSection
CreateThread
InitializeCriticalSection
DisableThreadLibraryCalls
CloseHandle
DeleteCriticalSection
HeapDestroy
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
GetCurrentProcessId
GetStringTypeW
GetStringTypeA
SetFilePointer
IsBadCodePtr
SetUnhandledExceptionFilter
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
SetHandleCount
GetStdHandle
LCMapStringW
LCMapStringA
HeapSize
TerminateProcess
IsBadWritePtr
HeapCreate
GetVersionExA
GetEnvironmentVariableA
GetModuleFileNameA
GetVersion
GetCommandLineA
HeapReAlloc
HeapAlloc
HeapFree
RtlUnwind
RaiseException
CharNextW
CharLowerW
MessageBoxW
SetWindowLongW
wsprintfA
RegDeleteKeyA
RegOpenKeyExA
RegQueryValueExA
RegEnumValueW
RegQueryInfoKeyW
RegSetValueExW
RegOpenKeyExW
RegCreateKeyExW
RegCloseKey
RegEnumKeyExW
RegDeleteKeyW
RegDeleteValueW
CoTaskMemAlloc
CoTaskMemRealloc
CoCreateInstance
CoTaskMemFree
VarUI4FromStr
SysFreeString
RegisterTypeLi
SysAllocString
LoadTypeLi
SysStringLen
LoadRegTypeLi
SysAllocStringLen
VariantClear
InternetOpenUrlA
InternetOpenA
InternetReadFile
InternetCloseHandle
HttpQueryInfoA
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ