DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
1858fe3d86a22644ab64862300772c6c_JaffaCakes118.dll
Resource
win7-20240903-en
Target
1858fe3d86a22644ab64862300772c6c_JaffaCakes118
Size
195KB
MD5
1858fe3d86a22644ab64862300772c6c
SHA1
5eee8837a7eb69cbac056b928135e35526f62055
SHA256
8346782150062b20e42055c6aa4c7e4481ee0ac22f3093ac2f8e02a95384ad13
SHA512
86f17ce43297cd165561a2a030636345e4f39bf4b304517a271681025dd15fd45e600de68457792e62b776173d69e7b5800b88eeb49b8286b2e79e3ae96b269f
SSDEEP
3072:NJlsT5tnQmvE7HjypSQW2T6diRkBrfJi42/T/wACP1gBEaR3rXgC4i/IOd:psT5m+E3ypTdRkBu7/61gBEaJXgC5Iq
Checks for missing Authenticode signature.
resource |
---|
1858fe3d86a22644ab64862300772c6c_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetCurrentProcess
FlushInstructionCache
lstrlenW
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InterlockedIncrement
InterlockedDecrement
InitializeCriticalSection
DisableThreadLibraryCalls
FormatMessageW
LocalAlloc
LocalFree
LoadLibraryW
GetProcAddress
lstrcpyA
lstrcmpW
WaitForMultipleObjects
lstrlenA
MultiByteToWideChar
WaitForSingleObject
CreateThread
Sleep
SetEvent
ResetEvent
CloseHandle
CreateEventW
GetLastError
GetVersionExW
WideCharToMultiByte
lstrcpyW
GetModuleFileNameW
GetComputerNameW
lstrcpynW
GetLocaleInfoW
CoInitialize
CoUninitialize
CoCreateInstance
SysStringLen
LoadRegTypeLi
DispCallFunc
SysAllocString
SysAllocStringLen
SysFreeString
SafeArrayUnaccessData
SafeArrayAccessData
SafeArrayCreateVector
VariantInit
VariantClear
StrStrW
StrChrW
StrToIntW
ord23
ord21
ord16
ord15
ord58
ord18
ord57
ord32
ord11
ord10
ord30
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
??1_Lockit@std@@QAE@XZ
??0_Lockit@std@@QAE@XZ
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ID@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBD0@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??1exception@@UAE@XZ
??0exception@@QAE@ABQBD@Z
strchr
free
__dllonexit
_onexit
??0exception@@QAE@ABV0@@Z
?terminate@@YAXXZ
_initterm
malloc
_adjust_fdiv
??2@YAPAXI@Z
_except_handler3
strtol
printf
memset
memcmp
_purecall
memcpy
_CxxThrowException
strlen
time
??1type_info@@UAE@XZ
__CxxFrameHandler
wsprintfW
wsprintfA
RegCloseKey
RegQueryInfoKeyW
RegEnumValueW
RegDeleteKeyW
RegSetValueExW
RegQueryValueExW
RegCreateKeyExW
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ