DllCanUnloadNow
Export
Install
Shutdown
StartShell
Uninstall
Static task
static1
Behavioral task
behavioral1
Sample
0dd446624b02d6134d71923cdfe7c17d_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0dd446624b02d6134d71923cdfe7c17d_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
0dd446624b02d6134d71923cdfe7c17d_JaffaCakes118
Size
27KB
MD5
0dd446624b02d6134d71923cdfe7c17d
SHA1
32dcf557ac703cee1f76b51b1e76ee1d16646f36
SHA256
7483c07752502dd573378a0f11acacec16922494af1fa9aab10ad5b3d55b47d8
SHA512
db6871a42b735c8d5f26d9b5791a378f1229653513cd1b40ba654e1a0892637a27200f18359cb2912c62486f7e01e188a8cfbc86c164b815bd28dc6189e27ed1
SSDEEP
384:lvEsMmw3TSx4q32sFU+pKVgNY8UdfMHKF9BKYzHybFOn6gIisWZgmDN593HGnWD3:lMwQQm/+6zfQKF9rmbc6QsYJ5ZH1Dkg
Checks for missing Authenticode signature.
resource |
---|
0dd446624b02d6134d71923cdfe7c17d_JaffaCakes118 |
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
InternetReadFile
InternetCloseHandle
InternetOpenUrlA
HttpQueryInfoA
InternetOpenA
UuidCreate
ObjectFromLresult
HeapFree
LoadLibraryA
LocalFree
CreateMutexA
WaitForSingleObject
ReleaseMutex
CreateFileA
WriteFile
LocalAlloc
GetLastError
lstrlenA
OpenMutexA
lstrcatA
GetTempPathA
GetTempFileNameA
CreateProcessA
VirtualAllocEx
VirtualProtectEx
FlushInstructionCache
WriteProcessMemory
OpenProcess
GetModuleHandleA
GetProcAddress
CreateRemoteThread
VirtualFreeEx
OpenEventA
SetEvent
ResetEvent
GetProcessHeap
GetFileAttributesExA
ReadFile
GetSystemTimeAsFileTime
GetFileAttributesA
lstrcmpA
GetCurrentThreadId
CreateToolhelp32Snapshot
Process32First
Process32Next
lstrcmpiA
lstrcpyW
lstrlenW
FindFirstFileW
FindClose
lstrcatW
FindFirstChangeNotificationW
WaitForMultipleObjects
FindNextChangeNotification
FindCloseChangeNotification
HeapAlloc
GetFileSize
SetFilePointer
WideCharToMultiByte
FindResourceA
LockResource
LoadResource
SizeofResource
MultiByteToWideChar
CreateFileMappingA
MapViewOfFile
FlushViewOfFile
UnmapViewOfFile
GetEnvironmentVariableA
CopyFileA
FreeLibrary
GetTempPathW
DeleteFileW
MoveFileExA
GetCommandLineA
lstrcpyA
CreateThread
InterlockedIncrement
GetModuleFileNameA
DisableThreadLibraryCalls
CloseHandle
GetCurrentProcess
FreeLibraryAndExitThread
Sleep
InterlockedDecrement
CreateEventA
CreateFileW
SendMessageA
GetClassNameA
SendMessageTimeoutA
SetWindowsHookExA
SetThreadDesktop
GetWindowThreadProcessId
CallNextHookEx
UnhookWindowsHookEx
wsprintfA
CharLowerA
GetThreadDesktop
RegisterWindowMessageA
CharUpperA
FindWindowA
GetTokenInformation
OpenProcessToken
AllocateAndInitializeSid
RegDeleteValueA
RegEnumValueA
RegQueryInfoKeyA
RegCloseKey
EqualSid
FreeSid
CreateWellKnownSid
GetLengthSid
InitializeAcl
AddAccessAllowedAce
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
SetSecurityDescriptorGroup
SetSecurityDescriptorSacl
GetUserNameW
RegOpenKeyExA
RegNotifyChangeKeyValue
RegDeleteKeyA
LookupPrivilegeValueA
AdjustTokenPrivileges
ShellExecuteW
CoUninitialize
StringFromCLSID
CoTaskMemFree
CoFreeUnusedLibraries
CoInitialize
CoCreateInstance
CoInitializeEx
SysAllocString
SysFreeString
DllCanUnloadNow
Export
Install
Shutdown
StartShell
Uninstall
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ