DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
16527781e42db6bb512101ada6d47082_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
16527781e42db6bb512101ada6d47082_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
16527781e42db6bb512101ada6d47082_JaffaCakes118
Size
48KB
MD5
16527781e42db6bb512101ada6d47082
SHA1
41e58ea90b0b0049097a9cf01e07458344851522
SHA256
d36fdd57bbe8a60378b0e5362a56c5f0b690b3a74a1138b569b89a27b4b6b585
SHA512
43239e0a595216e135a962982484da5b6a268242b9d3c58828eca1599140aac758615ef69f6ba0004375d11f07298d8fd044e20c9e041ae6a0ab18f2d7232904
SSDEEP
768:KKt/hh0kPdSpKbRwnyPQrZM3+hDELQoWdTn10bxLDb57qgX70Ay22:KKZ02MlyPC0+ReblDZq8v
Checks for missing Authenticode signature.
resource |
---|
16527781e42db6bb512101ada6d47082_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Process32First
GetModuleFileNameA
GetLocalTime
DisableThreadLibraryCalls
InitializeCriticalSection
DeleteCriticalSection
LeaveCriticalSection
InterlockedIncrement
EnterCriticalSection
InterlockedDecrement
HeapAlloc
GetSystemInfo
GetVersionExA
Process32Next
HeapDestroy
lstrlenW
MultiByteToWideChar
lstrlenA
GetShortPathNameA
GetModuleHandleA
GetSystemDirectoryA
DeleteFileA
GetWindowsDirectoryA
Sleep
CreateThread
WideCharToMultiByte
GetCurrentProcessId
CreateEventA
GetLastError
CloseHandle
GetCommandLineW
LoadLibraryA
GetProcAddress
HeapCreate
WritePrivateProfileStringA
DispatchMessageA
IsWindow
SetWindowTextA
SendMessageA
KillTimer
DefWindowProcA
CreateWindowExA
ShowWindow
RegisterClassExA
CallNextHookEx
FindWindowExA
PostMessageA
GetMessageA
TranslateMessage
SetTimer
RegSetValueExA
RegCreateKeyExA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
CommandLineToArgvW
CoCreateInstance
SysAllocString
VariantClear
SysStringLen
LoadRegTypeLi
SysFreeString
fopen
fwrite
_strlwr
fclose
rand
strcmp
memcmp
free
_initterm
malloc
_adjust_fdiv
_stricmp
strchr
memcpy
memset
_purecall
??2@YAPAXI@Z
strstr
strlen
strrchr
sprintf
??3@YAXPAX@Z
_access
strcat
strcpy
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ