DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
27b5ea9ba41d53aea63b4ec304feec3c_JaffaCakes118.dll
Resource
win7-20240903-en
Target
27b5ea9ba41d53aea63b4ec304feec3c_JaffaCakes118
Size
168KB
MD5
27b5ea9ba41d53aea63b4ec304feec3c
SHA1
be332139bcaf6cb5b5011ca51d3c7eeb71191814
SHA256
0db0ee542fddd4c1d7e0bbba6cb53c3372c9352d84bc45c25c92fe2eb2b2cd49
SHA512
5fddb14eebf10a17ab19adc816d58022657610a0f40479371cf4adc90018ba0064cfb6467a71637b9454321bc610954c20bff2810a2289f09b9e8611789bbbd3
SSDEEP
3072:3MjsGsI+ENIyeUVgcHhp6xqW4IjI1OJDOlBdg1NN:a75beUOG6TfjcsGd8
Checks for missing Authenticode signature.
resource |
---|
27b5ea9ba41d53aea63b4ec304feec3c_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
lstrlenA
CompareStringA
CompareStringW
DeleteFileA
CloseHandle
ReadFile
GetFileSize
CreateFileA
CreateProcessA
LocalFree
FormatMessageA
MoveFileA
GetSystemDirectoryA
HeapFree
GetProcessHeap
SetLastError
GlobalUnlock
GlobalLock
GlobalAlloc
EnterCriticalSection
LeaveCriticalSection
MulDiv
HeapAlloc
FlushInstructionCache
GetCurrentProcess
lstrcmpA
GetModuleFileNameA
GetCurrentThreadId
InterlockedIncrement
InterlockedDecrement
lstrcpynA
lstrcpyA
lstrcatA
IsDBCSLeadByte
FreeLibrary
LoadLibraryExA
GetModuleHandleA
DisableThreadLibraryCalls
CreateThread
GetLastError
RaiseException
WideCharToMultiByte
MultiByteToWideChar
FlushFileBuffers
SetStdHandle
LoadLibraryA
SetFilePointer
IsBadCodePtr
IsBadReadPtr
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
WriteFile
UnhandledExceptionFilter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
LCMapStringW
LCMapStringA
GetTimeZoneInformation
GetStringTypeW
GetStringTypeA
TlsGetValue
TlsSetValue
TlsFree
TlsAlloc
GetCPInfo
GetOEMCP
SetUnhandledExceptionFilter
TerminateProcess
GetProcAddress
IsBadWritePtr
VirtualFree
HeapCreate
ExitProcess
GetCommandLineA
GetSystemTimeAsFileTime
RtlUnwind
VirtualQuery
GetSystemInfo
GetVersionExA
VirtualAlloc
VirtualProtect
HeapSize
HeapReAlloc
lstrcmpiA
lstrlenW
FindResourceExA
FindResourceA
LoadResource
LockResource
SizeofResource
DeleteCriticalSection
InitializeCriticalSection
GetThreadLocale
GetLocaleInfoA
GetACP
SetEnvironmentVariableA
InterlockedExchange
HeapDestroy
UnregisterClassA
EndDialog
MoveWindow
IsDlgButtonChecked
GetDlgItem
SetRect
CheckDlgButton
BeginPaint
DestroyWindow
SetWindowLongA
GetWindowTextA
GetWindowTextLengthA
SetWindowPos
EnumChildWindows
SystemParametersInfoA
CopyRect
wsprintfA
CreateAcceleratorTableA
CharNextA
GetParent
GetClassNameA
RedrawWindow
IsWindow
SendMessageA
GetFocus
IsChild
SetFocus
EnumThreadWindows
EndPaint
GetSysColor
CallWindowProcA
GetDesktopWindow
InvalidateRgn
InvalidateRect
ReleaseDC
GetDC
GetClientRect
FillRect
SetCapture
ReleaseCapture
DestroyAcceleratorTable
GetWindowLongA
SetWindowTextA
DefWindowProcA
RegisterWindowMessageA
GetClassInfoExA
LoadCursorA
RegisterClassExA
CreateWindowExA
GetWindow
MapDialogRect
SetWindowContextHelpId
GetStockObject
GetObjectA
GetDeviceCaps
BitBlt
CreateCompatibleDC
CreateCompatibleBitmap
DeleteDC
SelectObject
DeleteObject
CreateSolidBrush
RegOpenKeyExA
RegCloseKey
RegDeleteValueA
RegDeleteKeyA
RegSetValueExA
RegCreateKeyExA
RegQueryInfoKeyA
RegEnumKeyExA
CreateStreamOnHGlobal
CoTaskMemRealloc
CoTaskMemFree
OleInitialize
OleUninitialize
StringFromGUID2
CoTaskMemAlloc
OleLockRunning
CoGetClassObject
CLSIDFromProgID
CLSIDFromString
CoCreateInstance
SysAllocStringByteLen
VarUI4FromStr
RegisterTypeLi
UnRegisterTypeLi
LoadTypeLi
LoadRegTypeLi
VariantInit
VariantClear
OleCreateFontIndirect
SysStringByteLen
SysStringLen
SysFreeString
SysAllocString
SysAllocStringLen
SHSetValueA
SHGetValueA
SHDeleteKeyA
PathFindExtensionA
URLDownloadToFileA
GetUrlCacheEntryInfoA
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ