DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
12d25495dd48b88314b79f4a7a2dde0b_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
12d25495dd48b88314b79f4a7a2dde0b_JaffaCakes118.dll
Resource
win10v2004-20240910-en
Target
12d25495dd48b88314b79f4a7a2dde0b_JaffaCakes118
Size
168KB
MD5
12d25495dd48b88314b79f4a7a2dde0b
SHA1
68730d3327c726944b3d9481afc32abce76994c7
SHA256
799a503ac89ed91c74e8339b26d2cd4e2788577ebd04854a1dff560bd57a33c0
SHA512
a71438b8d6ca4c49c1f6159525dcdd92545229289bb0a20017e1a6637b57f48929db5476dbba4e048924a040ae5aadbce4c644836d4b79aee0ea5a8f28adacb8
SSDEEP
3072:CYCAMJCNnZZbnSxvSO0uoFONzxbVotoeeos9:VCA9r8Kl3ONdbVoSd
Checks for missing Authenticode signature.
resource |
---|
12d25495dd48b88314b79f4a7a2dde0b_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetCurrentThreadId
InterlockedIncrement
InterlockedDecrement
FlushInstructionCache
lstrcpyA
lstrcatA
GlobalUnlock
GlobalLock
GlobalAlloc
GetSystemTime
GetCurrentProcess
DeleteCriticalSection
DisableThreadLibraryCalls
GetTickCount
GetCurrentProcessId
GetProcAddress
LoadLibraryA
HeapFree
GetStringTypeA
GetStringTypeW
RtlUnwind
WideCharToMultiByte
GetModuleFileNameA
GetModuleHandleA
GetShortPathNameA
lstrlenA
MultiByteToWideChar
lstrlenW
HeapCreate
GetVersionExA
GetSystemInfo
HeapAlloc
HeapDestroy
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
OutputDebugStringA
IsDBCSLeadByte
lstrcpynA
lstrcmpiA
LoadLibraryExA
GetLastError
FindResourceA
LoadResource
SizeofResource
FreeLibrary
DebugBreak
HeapReAlloc
GetVolumeInformationA
FormatMessageA
GetWindowsDirectoryA
EndPaint
OffsetRect
SetWindowRgn
SetWindowPos
IsWindow
DestroyWindow
GetParent
SetFocus
GetFocus
IsChild
IntersectRect
EqualRect
ReleaseDC
RegisterClassExA
CreateWindowExA
CallWindowProcA
GetWindowLongA
ShowWindow
UnionRect
PtInRect
GetKeyState
DefWindowProcA
GetClassInfoExA
GetDC
CharNextA
SetWindowLongA
EndDialog
DialogBoxParamA
GetClientRect
BeginPaint
GetActiveWindow
LoadStringA
MessageBoxW
LoadBitmapA
KillTimer
MessageBoxA
SetDlgItemTextA
SetTimer
EnableWindow
LoadCursorA
SetWindowTextA
wsprintfA
InvalidateRect
GetDlgItem
CloseMetaFile
SetWindowExtEx
CreateRectRgnIndirect
SetWindowOrgEx
SaveDC
CreateMetaFileA
GetDeviceCaps
DeleteDC
SetViewportOrgEx
SetMapMode
LPtoDP
CreateDCA
DeleteObject
BitBlt
SelectObject
CreateCompatibleDC
DeleteMetaFile
RestoreDC
RegOpenKeyExA
RegDeleteKeyA
RegCreateKeyExA
RegDeleteValueA
RegCloseKey
RegEnumKeyExA
RegSetValueExA
RegQueryInfoKeyA
RegEnumValueA
RegQueryValueExA
ShellExecuteA
CreateOleAdviseHolder
OleLoadFromStream
OleSaveToStream
CoGetClassObject
ProgIDFromCLSID
WriteClassStm
OleRegGetMiscStatus
OleRegEnumVerbs
CoCreateInstance
StringFromCLSID
CreateDataAdviseHolder
OleRegGetUserType
CoTaskMemRealloc
CoTaskMemAlloc
CoTaskMemFree
SysAllocStringByteLen
DispCallFunc
VariantChangeType
VariantClear
SysStringByteLen
LoadTypeLi
SysAllocString
RegisterTypeLi
VarUI4FromStr
LoadRegTypeLi
SysFreeString
OleCreatePropertyFrame
SafeArrayAccessData
SysStringLen
SafeArrayDestroy
SysAllocStringLen
SafeArrayCreate
SafeArrayUnaccessData
VariantCopy
SafeArrayRedim
CreateErrorInfo
SetErrorInfo
ioctlsocket
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ