DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
DummyMethod
DummyMethod1
DummyMethod2
DummyMethod3
DummyMethod4
DummyMethod5
GetClientLocid
GetClientTicket
Static task
static1
Behavioral task
behavioral1
Sample
0fa88cab69627f74199faf5dc8d1d8ad_JaffaCakes118.dll
Resource
win7-20240903-en
Target
0fa88cab69627f74199faf5dc8d1d8ad_JaffaCakes118
Size
122KB
MD5
0fa88cab69627f74199faf5dc8d1d8ad
SHA1
1e272b0c8db356a5fa0bfc0b2f319a78516505a5
SHA256
c1140131cf6fa23b4c36d2d2f6734450a6a5e71917ff89916aa150cc4232013e
SHA512
6c34267fbad70af11307caa2f55824a14dcef5b417153c5e15eddb4f8f54de7d87526a4161d0e970f094a15f655e35bd05c95fa9e2bbc1b93f17bdf98db177fb
SSDEEP
3072:ZECVj2Gqv8ttgFiYBMlj85ulAxrBf5hL:eRgGMZ7sh
Checks for missing Authenticode signature.
resource |
---|
0fa88cab69627f74199faf5dc8d1d8ad_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
InternetGetConnectedState
InternetCrackUrlA
HttpOpenRequestA
HttpQueryInfoA
InternetSetCookieA
wnsprintfA
PathFileExistsA
StrStrIA
GetLastError
GetModuleFileNameA
GetModuleHandleA
DeleteCriticalSection
GetVersionExA
lstrlenA
GetModuleHandleW
WideCharToMultiByte
LeaveCriticalSection
MultiByteToWideChar
lstrlenW
SetThreadLocale
GetThreadLocale
GetProcAddress
EnterCriticalSection
FindResourceA
FreeLibrary
LoadResource
SizeofResource
IsDBCSLeadByte
lstrcmpiA
LoadLibraryExA
RaiseException
HeapAlloc
WaitForSingleObject
GetProcessHeap
TerminateThread
Sleep
LoadLibraryA
CreateMutexA
CloseHandle
CreateThread
HeapFree
GetVolumeInformationA
SetLastError
lstrcpyA
GetSystemTimeAsFileTime
GetConsoleMode
GetConsoleCP
SetFilePointer
InitializeCriticalSection
InterlockedDecrement
InterlockedIncrement
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CreateFileA
FlushFileBuffers
HeapReAlloc
GetLocaleInfoA
GetStringTypeW
LCMapStringW
LCMapStringA
InitializeCriticalSectionAndSpinCount
RtlUnwind
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStartupInfoA
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
GetCurrentThreadId
GetCommandLineA
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
HeapSize
ExitProcess
HeapCreate
HeapDestroy
VirtualFree
WriteFile
GetStdHandle
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
SetHandleCount
GetFileType
GetStringTypeA
CharNextW
CharNextA
RegCreateKeyA
RegOpenKeyA
RegQueryValueExA
RegDeleteValueA
RegCreateKeyExA
RegEnumKeyExA
RegSetValueExA
RegCloseKey
RegQueryInfoKeyA
RegOpenKeyExA
RegDeleteKeyA
ShellExecuteA
StringFromGUID2
CoTaskMemRealloc
CoTaskMemFree
CoTaskMemAlloc
CoCreateInstance
LoadRegTypeLi
VarUI4FromStr
SysAllocStringLen
VariantInit
VariantClear
RegisterTypeLi
UnRegisterTypeLi
LoadTypeLi
SysStringLen
SysAllocString
SysFreeString
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
DummyMethod
DummyMethod1
DummyMethod2
DummyMethod3
DummyMethod4
DummyMethod5
GetClientLocid
GetClientTicket
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ