ControlPanel
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Rundll32
Static task
static1
Behavioral task
behavioral1
Sample
1628936d44d4b26e2e03dc1477ae62ea_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1628936d44d4b26e2e03dc1477ae62ea_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
1628936d44d4b26e2e03dc1477ae62ea_JaffaCakes118
Size
252KB
MD5
1628936d44d4b26e2e03dc1477ae62ea
SHA1
39773a839a7b75052d4d3282ddc6ad983e0bb4d4
SHA256
a2078e86f3a19ef847e1a6bd25fba9927bc06808e5f34eaf8154c7694c260dae
SHA512
1e50d63840049a2579b4b4c34a7439e353c88dec7416276e398b83d04130e3f2b5f239588561ddcd14ed23d6d4a69ea0373f2a472f4c125948d00b658a215e31
SSDEEP
6144:P+UVPgz6n/tInqsyvNMKJuM8EW6v7qMSExhYrgSPk:P+2U6VVOgSM
Checks for missing Authenticode signature.
resource |
---|
1628936d44d4b26e2e03dc1477ae62ea_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
ImageDirectoryEntryToData
InterlockedIncrement
EnterCriticalSection
HeapDestroy
GetCurrentThreadId
FlushInstructionCache
Sleep
GetEnvironmentVariableA
GetWindowsDirectoryA
CopyFileA
IsBadCodePtr
TerminateThread
GetSystemDefaultLangID
CreateRemoteThread
WriteProcessMemory
VirtualAllocEx
SetLastError
LeaveCriticalSection
FindNextFileA
FindFirstFileA
WriteFile
GetVolumeInformationA
Module32Next
GetLocalTime
SetErrorMode
VirtualFreeEx
GetExitCodeThread
LocalFree
WinExec
GetCommandLineA
CreateDirectoryA
RemoveDirectoryA
MoveFileExA
LocalAlloc
DeleteCriticalSection
InitializeCriticalSection
IsDBCSLeadByte
lstrcpynA
lstrcmpiA
LoadLibraryExA
GetTempFileNameA
GetACP
GetCurrentProcessId
InterlockedExchange
WritePrivateProfileStringA
lstrlenA
InterlockedDecrement
FindResourceA
LoadResource
SizeofResource
lstrcpyA
lstrcatA
lstrlenW
WideCharToMultiByte
MultiByteToWideChar
ReleaseMutex
GetSystemDirectoryA
GetTempPathA
DeviceIoControl
GetTickCount
GetPrivateProfileSectionA
GetPrivateProfileStringA
WaitForSingleObject
CreateMutexA
GetShortPathNameA
IsBadWritePtr
GetModuleHandleA
IsBadReadPtr
VirtualProtect
VirtualQuery
GetModuleFileNameA
LoadLibraryA
GetProcAddress
GetVersionExA
Process32Next
FreeLibrary
GetCurrentThread
GetLastError
GetCurrentProcess
OpenProcess
TerminateProcess
CreateFileA
GetFileSize
SetFilePointer
ReadFile
CloseHandle
DeleteFileA
RaiseException
FindClose
SetCursor
SetCapture
ReleaseCapture
IsWindowVisible
SystemParametersInfoA
GetSysColor
DrawEdge
InflateRect
CopyRect
DrawTextA
UpdateWindow
FillRect
PeekMessageA
GetMessageA
TranslateMessage
DispatchMessageA
SendMessageA
DefWindowProcW
CallWindowProcW
GetKeyState
SetPropA
ReplyMessage
InSendMessage
CharUpperA
CharLowerA
SetRect
GetPropA
RemovePropA
GetWindowThreadProcessId
IsWindowUnicode
GetWindowTextLengthW
GetWindowTextW
SetWindowTextA
GetWindowTextLengthA
GetWindowTextA
CallNextHookEx
SetWindowsHookExA
UnhookWindowsHookEx
UnregisterClassA
CharUpperBuffA
GetDesktopWindow
GetMenu
GetClientRect
GetDC
ReleaseDC
InvalidateRect
IntersectRect
EqualRect
OffsetRect
SetWindowRgn
SetWindowPos
IsWindow
GetParent
SetFocus
GetFocus
IsChild
DestroyWindow
GetClassInfoExA
LoadCursorA
wsprintfA
RegisterClassExA
CreateWindowExA
CallWindowProcA
GetWindowLongA
DefWindowProcA
CharNextA
GetForegroundWindow
DialogBoxParamA
MessageBoxA
IsDlgButtonChecked
EndDialog
BeginPaint
EndPaint
LoadIconA
DrawIcon
GetSystemMetrics
SetForegroundWindow
ShowWindow
PostMessageA
LoadStringA
SetTimer
KillTimer
GetClassNameW
GetAncestor
GetClassNameA
SetWindowLongW
IsWindowEnabled
SetWindowLongA
PtInRect
GetTextMetricsA
GetStockObject
CreatePen
MoveToEx
LineTo
CreateRectRgnIndirect
RestoreDC
DeleteDC
SetViewportOrgEx
SetWindowOrgEx
SetMapMode
SaveDC
LPtoDP
GetDeviceCaps
CreateDCA
DeleteObject
SelectObject
SetTextColor
SetBkMode
Rectangle
CreateSolidBrush
RegSetValueA
RegQueryValueA
RegCreateKeyA
RegFlushKey
ControlService
StartServiceA
OpenServiceA
DeleteService
CreateServiceA
RegOpenKeyA
RegEnumKeyA
RegQueryValueExA
RegQueryInfoKeyA
RegSetValueExA
RegEnumKeyExA
RegDeleteValueA
RegCreateKeyExA
RegDeleteKeyA
CloseServiceHandle
OpenSCManagerA
RegOpenKeyExA
RegEnumValueA
RegCloseKey
OpenThreadToken
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
SHDeleteKeyA
SHSetValueA
SHGetValueA
SHDeleteValueA
PathFindFileNameA
StrStrIA
SHDeleteEmptyKeyA
memset
strcpy
strlen
strcat
__CxxFrameHandler
fopen
fprintf
fclose
??3@YAXPAX@Z
_beginthreadex
??2@YAPAXI@Z
sscanf
sprintf
atoi
strtok
_strnicmp
strcmp
strrchr
strncpy
_snprintf
malloc
strstr
free
_except_handler3
time
fwrite
isalnum
memcpy
wcscpy
_mbspbrk
strchr
memmove
memcmp
strncmp
_stricmp
realloc
_purecall
atol
fgets
fseek
_mbsnbcpy
abs
_ftol
_strlwr
strncat
_mbsrchr
_mbsstr
rewind
__dllonexit
_onexit
?terminate@@YAXXZ
_initterm
_adjust_fdiv
Netbios
ControlPanel
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Rundll32
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ