DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
17dd20653e8ce05704429357222c6950_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
17dd20653e8ce05704429357222c6950_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
17dd20653e8ce05704429357222c6950_JaffaCakes118
Size
48KB
MD5
17dd20653e8ce05704429357222c6950
SHA1
f36a736370ed1e07cc44437412a93a5ab76488fb
SHA256
e1016181e8c94091d3f0e44059fa2065d1b477d3707c3ccabf6075802313794d
SHA512
d9a76cc23432eea0b214602d410a87967ddda3c13fea19d17390f269d3cfad2e044fb2a49a9456daf7f33d422801967fc8d41780351cf145275c3cefa376f225
SSDEEP
768:evwrpkjWLAYfrZfzTAe2YnZsKeRXnOh9zHaE78aXjQ6bC:WEDXDZfq2xcOh9zHax6Qd
Checks for missing Authenticode signature.
resource |
---|
17dd20653e8ce05704429357222c6950_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Sleep
CreateThread
WideCharToMultiByte
lstrlenW
MultiByteToWideChar
lstrlenA
Process32Next
Process32First
GetSystemDirectoryA
GetCurrentProcessId
DisableThreadLibraryCalls
InitializeCriticalSection
DeleteCriticalSection
LoadLibraryA
InterlockedDecrement
HeapAlloc
GetSystemInfo
GetVersionExA
HeapCreate
HeapDestroy
GetShortPathNameA
GetModuleHandleA
GetLocalTime
GetLastError
GetWindowsDirectoryA
CreateEventA
GetCommandLineW
GetProcAddress
WritePrivateProfileStringA
GetModuleFileNameA
DeleteFileA
CloseHandle
EnterCriticalSection
InterlockedIncrement
LeaveCriticalSection
TranslateMessage
DispatchMessageA
CallNextHookEx
CreateWindowExA
ShowWindow
KillTimer
SetTimer
DefWindowProcA
IsWindow
SetWindowTextA
SendMessageA
FindWindowExA
PostMessageA
GetMessageA
RegisterClassExA
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
RegSetValueExA
RegCreateKeyExA
CommandLineToArgvW
CoCreateInstance
SysStringLen
LoadRegTypeLi
SysAllocString
VariantClear
SysFreeString
fopen
fwrite
_strlwr
fclose
memcmp
_purecall
strstr
free
_initterm
malloc
_adjust_fdiv
_stricmp
strchr
strcmp
memset
strcpy
??2@YAPAXI@Z
strcat
strrchr
_access
sprintf
rand
strlen
??3@YAXPAX@Z
memcpy
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ