DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
164b742c053c3cf682622a73bcc6d2fb_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
164b742c053c3cf682622a73bcc6d2fb_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
164b742c053c3cf682622a73bcc6d2fb_JaffaCakes118
Size
152KB
MD5
164b742c053c3cf682622a73bcc6d2fb
SHA1
22f94d99f3f76570f191983e1f6811755aea3b9f
SHA256
aa781903dd0eea8732f98565e7185aaa5d167ce6a132dc66a30a1289f0e289b2
SHA512
8d04f4d4466c2efb69b348286b4eff94b9d91668ac67cab872791bc644dfce53002ebdbf4afe4281c202f0370326a0a4301ef774e075e8c055b87f57cbbe67ac
SSDEEP
3072:IHKw3nGei3wLtNHms/sos+rSUNSC4pCLJ8lhjxPslY:IHfFCwJNHGTUl+QY
Checks for missing Authenticode signature.
resource |
---|
164b742c053c3cf682622a73bcc6d2fb_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
HeapCreate
InitializeCriticalSection
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
InterlockedDecrement
HeapDestroy
GetCurrentThreadId
FlushInstructionCache
GetCurrentProcess
CloseHandle
OpenProcess
GetCurrentProcessId
GetCommandLineA
CreateProcessA
SetEvent
CreateThread
CreateEventA
SetLastError
DebugBreak
HeapReAlloc
HeapFree
GetVersionExA
GetSystemInfo
HeapAlloc
DeleteFileA
LocalFree
DisableThreadLibraryCalls
_lopen
_lcreat
_llseek
_lwrite
_lclose
GetCurrentThread
SetThreadPriority
OpenFileMappingA
DuplicateHandle
ResetEvent
UnmapViewOfFile
CreateMutexA
CreateFileMappingA
MapViewOfFile
ReleaseMutex
CreateFileA
GetFileSize
ReadFile
GetDriveTypeA
GetFileAttributesA
GetTimeZoneInformation
SystemTimeToFileTime
FileTimeToSystemTime
GetDateFormatA
GetTimeFormatA
GetCurrentDirectoryA
SetCurrentDirectoryA
GetSystemDirectoryA
CreateDirectoryA
WaitForMultipleObjects
WaitForSingleObject
IsDBCSLeadByte
LoadLibraryExA
GetLastError
FindResourceA
LoadResource
SizeofResource
GetModuleHandleA
GetShortPathNameA
InterlockedIncrement
lstrcpynA
GetTickCount
lstrlenW
WideCharToMultiByte
lstrcmpA
MultiByteToWideChar
FreeLibrary
LoadLibraryA
GetProcAddress
lstrcpyA
lstrcatA
lstrcmpiA
GetModuleFileNameA
lstrlenA
CopyFileA
DispatchMessageA
TranslateMessage
PeekMessageA
GetWindowLongA
GetParent
SetForegroundWindow
GetMessagePos
SendMessageA
TrackPopupMenu
GetCursorPos
CreateDialogParamA
KillTimer
SetTimer
LoadMenuA
DestroyMenu
EnumWindows
GetSubMenu
GetWindowTextA
GetClassNameA
EnumThreadWindows
PostMessageA
GetMessageA
PostQuitMessage
GetWindowThreadProcessId
BeginPaint
GetClientRect
EndPaint
GetDC
ReleaseDC
IntersectRect
EqualRect
OffsetRect
SetWindowRgn
SetWindowPos
IsWindow
GetClassInfoExA
LoadCursorA
RegisterClassExA
CreateWindowExA
CallWindowProcA
SetWindowLongA
UnionRect
PtInRect
GetKeyState
InvalidateRect
GetFocus
IsChild
SetFocus
DestroyWindow
DefWindowProcA
CharNextA
wsprintfA
ShowWindow
IsWindowVisible
IsIconic
GetLastActivePopup
RegisterClassA
UnregisterClassA
PostThreadMessageA
AttachThreadInput
GetKeyboardType
MsgWaitForMultipleObjects
CopyRect
LoadImageA
GetSystemMetrics
DeleteDC
CreateRectRgnIndirect
SetWindowOrgEx
SetMapMode
SaveDC
SetViewportOrgEx
RestoreDC
GetDeviceCaps
CreateFontIndirectA
EnumFontFamiliesExA
LPtoDP
CreateDCA
RegEnumKeyA
RegQueryValueExA
RegQueryInfoKeyA
RegEnumKeyExA
RegOpenKeyExA
RegDeleteValueA
RegDeleteKeyA
RegFlushKey
RegCreateKeyExA
RegCloseKey
RegSetValueExA
RegEnumValueA
SHGetMalloc
SHGetPathFromIDListA
SHGetSpecialFolderLocation
Shell_NotifyIconA
CoFreeUnusedLibraries
CoTaskMemFree
CoTaskMemAlloc
CoTaskMemRealloc
OleRegEnumVerbs
OleRegGetUserType
OleRegGetMiscStatus
CoCreateInstance
CreateOleAdviseHolder
SysStringLen
LoadRegTypeLi
RegisterTypeLi
LoadTypeLi
VariantInit
VariantClear
SysFreeString
SysAllocStringLen
SysAllocString
VariantChangeTypeEx
ord17
GetFileVersionInfoA
VerQueryValueA
GetFileVersionInfoSizeA
recv
closesocket
select
gethostbyname
htons
inet_ntoa
send
htonl
WSAStartup
WSAGetLastError
WSACleanup
connect
setsockopt
socket
shutdown
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ