DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
10f223511f8bbe2bfc828a855b7ecaed_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
10f223511f8bbe2bfc828a855b7ecaed_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
10f223511f8bbe2bfc828a855b7ecaed_JaffaCakes118
Size
48KB
MD5
10f223511f8bbe2bfc828a855b7ecaed
SHA1
825f88ffa7901773f51b6ccf5a886c3004d8354c
SHA256
1434ccc8c22212024cc677fff8d4488fa1f7782769b61da463b5c21a50e1b4b1
SHA512
9c468bdcc13920ad0020e7af46d70aea357930802003b75808688bf7c7ca70aa86c0d49b75c14ab2e67c177b5cc3898614e37cd5442c9b1e5cc911b44780e49d
SSDEEP
768:NCMTywLZbA2KlTNyfMHoM/O28UWQrEVFRGdcflpgqidPQvecSQC:EMTyCZUNyfMXW2HfrE3RqcNpsuv0
Checks for missing Authenticode signature.
resource |
---|
10f223511f8bbe2bfc828a855b7ecaed_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
LeaveCriticalSection
InterlockedIncrement
EnterCriticalSection
InterlockedDecrement
HeapAlloc
GetSystemInfo
GetVersionExA
HeapCreate
HeapDestroy
lstrlenW
MultiByteToWideChar
lstrlenA
GetShortPathNameA
GetModuleHandleA
GetModuleFileNameA
DeleteCriticalSection
GetCommandLineW
GetCurrentProcessId
GetLocalTime
GetSystemDirectoryA
GetWindowsDirectoryA
CreateEventA
WritePrivateProfileStringA
Process32Next
Process32First
Sleep
CreateThread
WideCharToMultiByte
InitializeCriticalSection
DisableThreadLibraryCalls
CloseHandle
LoadLibraryA
GetProcAddress
GetLastError
DeleteFileA
PostMessageA
DefWindowProcA
IsWindow
CreateWindowExA
ShowWindow
RegisterClassExA
SetWindowTextA
SendMessageA
GetMessageA
TranslateMessage
DispatchMessageA
FindWindowExA
KillTimer
SetTimer
CallNextHookEx
RegQueryValueExA
RegOpenKeyExA
RegSetValueExA
RegCreateKeyExA
RegCloseKey
CommandLineToArgvW
CoCreateInstance
SysAllocString
VariantClear
SysStringLen
LoadRegTypeLi
SysFreeString
strcat
strchr
_strlwr
fopen
fwrite
fclose
strcmp
free
_initterm
malloc
_adjust_fdiv
_stricmp
rand
strcpy
strstr
strlen
sprintf
_access
strrchr
memcmp
memcpy
memset
??2@YAPAXI@Z
_purecall
??3@YAXPAX@Z
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ