DllCanUnloadNow
DllGetClassObject
DllPreinstall
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
16b37d24e87b08f7e9381b0c30bfe6dd_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
16b37d24e87b08f7e9381b0c30bfe6dd_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
16b37d24e87b08f7e9381b0c30bfe6dd_JaffaCakes118
Size
318KB
MD5
16b37d24e87b08f7e9381b0c30bfe6dd
SHA1
91f66152a7a22dbdfff334369ed64bf94ed4b367
SHA256
5a2c1266257a0e647fb67f910b96ec11130a907be6384de444180acb0fe88272
SHA512
87e3c28677bf57e77523e19c2709cdad55f4985b88a2318374b481c0c1806988f05ba73a161c8b8a6db1bd50e13f55a6deab6d8a5ccd7ef0f0164946ccf2527b
SSDEEP
6144:WlTO/3rP6fsg+E9mxJI8iiM3iV0BFiK0p2c9AfpoEj:WlTU3rP6fslE9mxJI8iiMSV03iLT92
Checks for missing Authenticode signature.
resource |
---|
16b37d24e87b08f7e9381b0c30bfe6dd_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
UuidToStringW
RpcStringFreeW
StrStrIW
SHDeleteKeyW
UrlEscapeW
StrCmpIW
PathStripPathW
URLDownloadToFileW
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetProcAddress
LoadLibraryA
ExitThread
GetSystemTime
CreateEventW
CloseHandle
DeleteFileW
MoveFileExW
FreeLibrary
LoadLibraryW
WideCharToMultiByte
MultiByteToWideChar
lstrlenW
GetStringTypeA
LCMapStringA
GetLocaleInfoA
InitializeCriticalSectionAndSpinCount
GetConsoleMode
GetConsoleCP
SetFilePointer
HeapReAlloc
VirtualAlloc
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
VirtualFree
HeapDestroy
HeapCreate
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CreateFileA
FlushFileBuffers
GetStringTypeW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
SetHandleCount
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
GetModuleFileNameA
GetStdHandle
WriteFile
GetModuleHandleA
ExitProcess
HeapSize
Sleep
RaiseException
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RtlUnwind
GetCurrentThreadId
GetCommandLineA
GetLastError
HeapFree
HeapAlloc
GetModuleHandleW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
InterlockedDecrement
LCMapStringW
GetWindowTextW
EnumChildWindows
RealGetWindowClassW
CallWindowProcW
SetWindowLongW
SetPropW
GetWindowThreadProcessId
PostMessageW
SendMessageW
GetPropW
RemovePropW
OffsetRect
IntersectRect
InflateRect
ClientToScreen
SetWindowTextW
MsgWaitForMultipleObjects
PeekMessageW
TranslateMessage
DispatchMessageW
GetClassNameW
SetActiveWindow
RegQueryValueExW
ConvertStringSecurityDescriptorToSecurityDescriptorW
GetSecurityDescriptorSacl
SetSecurityInfo
RegOpenKeyExW
RegDeleteKeyW
RegQueryValueW
RegDeleteValueW
RegSetValueExW
RegCreateKeyW
RegCloseKey
CoTaskMemFree
CoCreateInstance
CoUninitialize
CoInitializeEx
VariantCopy
SafeArrayCreateVector
SafeArrayPutElement
SafeArrayDestroy
SysAllocString
VariantChangeType
VariantClear
VariantInit
SysAllocStringLen
SysFreeString
SysStringLen
DllCanUnloadNow
DllGetClassObject
DllPreinstall
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ