DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
1660f8852e48b4d91c6f20c9a4f126c2_JaffaCakes118.dll
Resource
win7-20240708-en
Target
1660f8852e48b4d91c6f20c9a4f126c2_JaffaCakes118
Size
216KB
MD5
1660f8852e48b4d91c6f20c9a4f126c2
SHA1
09cec5eba992c7e0972a32d92dd6e9c10780aff0
SHA256
537fa205aece87e99830ac61f55e93eab93c7fe0d19681969d5893988718310b
SHA512
2c648d52cd9ef3f9d78dec87cb077053a9814be693c93174e21c7553de681781347451d6a7fcf8c58bb9398510f3ee7be38edbafe371d76ac1c387714015ed01
SSDEEP
1536:jyE+ou93hM5vuIxomqrMeOE9caxwlI3kcASHNSHP7otVryLBaFVXzCiawvWv1qlc:jyU6ujqrMeOEHxEvbcazv1qlAN
Checks for missing Authenticode signature.
resource |
---|
1660f8852e48b4d91c6f20c9a4f126c2_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
lstrlenA
SizeofResource
LoadResource
FindResourceW
GetLastError
LoadLibraryExW
lstrcpynW
lstrcpyW
lstrcatW
GetLocalTime
Sleep
CreateFileA
GetTempPathA
FlushFileBuffers
WriteFile
DeleteFileA
DeviceIoControl
WideCharToMultiByte
IsBadReadPtr
GetCurrentProcessId
GetProcAddress
MultiByteToWideChar
GetCurrentProcess
DebugBreak
SetErrorMode
OpenEventA
ExitProcess
OutputDebugStringA
LoadLibraryA
GetWindowsDirectoryA
VirtualAlloc
VirtualFree
LocalFree
SetStdHandle
GetOEMCP
GetACP
GetCPInfo
lstrcmpiW
FreeLibrary
GetModuleFileNameW
GetModuleHandleW
GetShortPathNameW
lstrlenW
InterlockedDecrement
InterlockedIncrement
EnterCriticalSection
LeaveCriticalSection
CreateThread
InitializeCriticalSection
DisableThreadLibraryCalls
DeleteCriticalSection
CloseHandle
HeapDestroy
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
GetModuleHandleA
GetStringTypeW
GetStringTypeA
SetFilePointer
IsBadCodePtr
SetUnhandledExceptionFilter
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
SetHandleCount
GetStdHandle
LCMapStringW
LCMapStringA
HeapSize
TerminateProcess
IsBadWritePtr
HeapCreate
GetVersionExA
GetEnvironmentVariableA
GetModuleFileNameA
GetVersion
GetCommandLineA
HeapReAlloc
HeapAlloc
HeapFree
RtlUnwind
RaiseException
CharNextW
CharLowerW
MessageBoxW
SetWindowLongW
wsprintfA
RegDeleteKeyA
RegOpenKeyExA
RegQueryValueExA
RegEnumValueW
RegQueryInfoKeyW
RegSetValueExW
RegOpenKeyExW
RegCreateKeyExW
RegCloseKey
RegEnumKeyExW
RegDeleteKeyW
RegDeleteValueW
CoTaskMemAlloc
CoTaskMemRealloc
CoCreateInstance
CoTaskMemFree
VarUI4FromStr
SysFreeString
RegisterTypeLi
SysAllocString
LoadTypeLi
SysStringLen
LoadRegTypeLi
SysAllocStringLen
VariantClear
InternetOpenUrlA
InternetOpenA
InternetReadFile
InternetCloseHandle
HttpQueryInfoA
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ