DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
0c7c51483c2683a0560db6dc5dd1e3fc_JaffaCakes118.dll
Resource
win7-20240903-en
Target
0c7c51483c2683a0560db6dc5dd1e3fc_JaffaCakes118
Size
557KB
MD5
0c7c51483c2683a0560db6dc5dd1e3fc
SHA1
3613c591052b8588049261e59597f94a9e91f53e
SHA256
0e2ad3d3c0daccca4f374fdd57a329b0a4100f2d5094f3c8e5056e0fc6ead25e
SHA512
8deea4aa2ec72a64cb9d7d1d1503c2b995635de5fbd05ceea21c145ec0d02cb8f3351e2ca8341ff1dcafd6a1b85edf78aeac5779ea0de54e8ba6658bb2784baa
SSDEEP
6144:EoI3Ivd4X+IgvTI7PBGsefCp9Zql2J5BOLm1vPSW0BTUnacjW9NaOL7WgUtrcFax:dI3IVSPgeYse67Qf/53coLnfnIxS6N
Checks for missing Authenticode signature.
resource |
---|
0c7c51483c2683a0560db6dc5dd1e3fc_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
InterlockedDecrement
EnterCriticalSection
LeaveCriticalSection
GetModuleFileNameW
MultiByteToWideChar
SizeofResource
LoadResource
FindResourceW
LoadLibraryExW
GetModuleHandleW
LockResource
SetThreadLocale
GetThreadLocale
InterlockedIncrement
EndUpdateResourceW
UpdateResourceW
BeginUpdateResourceW
CloseHandle
TerminateThread
Sleep
GetExitCodeThread
GetTickCount
SetEnvironmentVariableA
CompareStringW
CompareStringA
GetTimeZoneInformation
lstrcmpiW
DeleteCriticalSection
InitializeCriticalSection
RaiseException
LoadLibraryW
GetProcAddress
lstrlenW
WideCharToMultiByte
GetLastError
lstrlenA
FreeLibrary
GetLocaleInfoW
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
GetDateFormatA
GetTimeFormatA
GetStringTypeA
LCMapStringW
LCMapStringA
LoadLibraryA
InterlockedExchange
SetConsoleCtrlHandler
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetStringTypeW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
SetHandleCount
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
GetModuleFileNameA
GetStdHandle
WriteFile
ExitProcess
GetCurrentThread
SetLastError
TlsFree
HeapFree
HeapAlloc
HeapReAlloc
RtlUnwind
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCurrentThreadId
GetCommandLineA
GetVersionExA
GetProcessHeap
HeapDestroy
HeapCreate
VirtualFree
FatalAppExitA
VirtualAlloc
HeapSize
GetModuleHandleA
TlsGetValue
TlsAlloc
TlsSetValue
UnregisterClassA
MessageBoxW
PostMessageW
CharNextW
IsTextUnicode
RegEnumKeyExW
RegQueryInfoKeyW
RegSetValueExW
RegOpenKeyExW
RegCreateKeyExW
RegCloseKey
RegDeleteValueW
RegDeleteKeyW
RegQueryValueExW
CoTaskMemAlloc
CoGetClassObject
StringFromGUID2
CoCreateInstance
CoTaskMemRealloc
CoTaskMemFree
RegisterTypeLi
VarBstrCmp
SysFreeString
SysAllocString
SysAllocStringByteLen
SysStringByteLen
VarUI4FromStr
SysStringLen
LoadRegTypeLi
LoadTypeLi
VarBstrCat
SysAllocStringLen
UnRegisterTypeLi
VariantClear
NdrStubForwardingFunction
NdrOleFree
NdrOleAllocate
IUnknown_Release_Proxy
IUnknown_AddRef_Proxy
IUnknown_QueryInterface_Proxy
NdrDllGetClassObject
NdrDllCanUnloadNow
NdrCStdStubBuffer_Release
NdrCStdStubBuffer2_Release
NdrDllRegisterProxy
NdrDllUnregisterProxy
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ