DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
137f5f4140fe9bac9d52ad0c85d2beee_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
137f5f4140fe9bac9d52ad0c85d2beee_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
137f5f4140fe9bac9d52ad0c85d2beee_JaffaCakes118
Size
48KB
MD5
137f5f4140fe9bac9d52ad0c85d2beee
SHA1
36bcd7537db528d07475e23bd304f5441c5b9f07
SHA256
ddd22518b7478131413a1c3a6ad6ba6efa4c270c716941cf24a2cc25128b17bf
SHA512
57a9c7fdd85ef172de4690715bbf1c3e19279e82f1fcf0bc3e1922b2efaa210f4709d73ea31247da82f5bfedc3dfbf405c462f4e8e87aa3d70d9b7bb15a5b554
SSDEEP
768:0KB3IuUm9xnRQW3xT3IUHqgAPZyZeVX6d5EfrpMxvXXg:DB3IG9xRd3VIQG4C6djvXXg
Checks for missing Authenticode signature.
resource |
---|
137f5f4140fe9bac9d52ad0c85d2beee_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
MultiByteToWideChar
lstrlenA
GetLastError
GetLocalTime
GetCurrentProcessId
WritePrivateProfileStringA
GetWindowsDirectoryA
GetSystemDirectoryA
DeleteFileA
Process32Next
lstrlenW
InterlockedIncrement
DisableThreadLibraryCalls
InitializeCriticalSection
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
InterlockedDecrement
HeapAlloc
GetSystemInfo
GetVersionExA
HeapCreate
HeapDestroy
GetShortPathNameA
GetModuleHandleA
CreateEventA
WideCharToMultiByte
CreateThread
Sleep
GetProcAddress
GetModuleFileNameA
LoadLibraryA
CloseHandle
Process32First
GetCommandLineW
SetWindowTextA
SendMessageA
CallNextHookEx
KillTimer
SetTimer
DefWindowProcA
RegisterClassExA
CreateWindowExA
ShowWindow
GetMessageA
TranslateMessage
DispatchMessageA
FindWindowExA
IsWindow
PostMessageA
RegQueryValueExA
RegOpenKeyExA
RegSetValueExA
RegCreateKeyExA
RegCloseKey
CommandLineToArgvW
CoCreateInstance
SysStringLen
LoadRegTypeLi
SysAllocString
VariantClear
SysFreeString
_purecall
strchr
_strlwr
fopen
fwrite
fclose
??2@YAPAXI@Z
free
_initterm
malloc
_adjust_fdiv
_stricmp
memcmp
strcat
_access
memset
strcpy
strstr
strcmp
strrchr
??3@YAXPAX@Z
sprintf
rand
memcpy
strlen
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ