DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
2c8a262315a7f53a730aefa0d7d9cd7b_JaffaCakes118.dll
Resource
win7-20240708-en
Target
2c8a262315a7f53a730aefa0d7d9cd7b_JaffaCakes118
Size
148KB
MD5
2c8a262315a7f53a730aefa0d7d9cd7b
SHA1
c214e682110e04df891196035ca907922047e17e
SHA256
98859890e872834bed3afae5d3d18c16c32ada0c04f954e7f0168286eb5b7f0f
SHA512
560ba3cbe49b56d7e64042b0ab1663269ddab82d60e07baab2fff949e927598696b57a63cc8145eb5f2abedd354ce3b37a579bda1559c7a777b7b3374c634ea7
SSDEEP
1536:XRxweALym2TAdU899lt4+hV/NarrWUuAztz1TkIPur5oytOnP8Er/Cto7LMv:X7k/2OH4SMVBxXur5oyPEr/Ct+LM
Checks for missing Authenticode signature.
resource |
---|
2c8a262315a7f53a730aefa0d7d9cd7b_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetLastError
LoadLibraryExW
MultiByteToWideChar
lstrcmpiW
lstrcpynW
HeapDestroy
GetProcAddress
LoadLibraryW
lstrcpyW
lstrcatW
ReadFile
CreateFileA
GetTempPathA
FlushFileBuffers
WriteFile
DeleteFileA
DeviceIoControl
WideCharToMultiByte
IsBadReadPtr
Module32NextW
Module32FirstW
FindResourceW
GetModuleHandleA
WriteProcessMemory
GetCurrentProcess
VirtualProtect
Sleep
DebugBreak
SetErrorMode
OpenEventA
ExitProcess
GetFileSize
GetSystemDirectoryA
OutputDebugStringA
LoadLibraryA
ReadProcessMemory
GlobalLock
GlobalAlloc
GetWindowsDirectoryA
CreateThread
GetTickCount
LocalFree
LoadResource
SizeofResource
lstrlenA
FreeLibrary
lstrlenW
GetModuleFileNameW
GetModuleHandleW
GetShortPathNameW
InterlockedDecrement
InterlockedIncrement
DeleteCriticalSection
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
DisableThreadLibraryCalls
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
GetCurrentProcessId
CloseHandle
MessageBoxW
CharLowerW
wsprintfA
SetWindowLongW
CharNextW
RegCreateKeyExA
RegFlushKey
RegDeleteKeyA
RegOpenKeyExA
RegQueryValueExA
RegEnumValueW
RegQueryInfoKeyW
RegSetValueExW
RegEnumKeyExW
RegOpenKeyExW
RegCreateKeyExW
RegCloseKey
RegDeleteValueW
RegDeleteKeyW
RegDeleteValueA
AdjustTokenPrivileges
LookupPrivilegeValueW
OpenProcessToken
RegSetValueExA
CoTaskMemRealloc
CoCreateInstance
CoTaskMemAlloc
CoTaskMemFree
VariantClear
SysAllocStringLen
SysStringLen
LoadRegTypeLi
RegisterTypeLi
SysAllocString
LoadTypeLi
SysFreeString
VarUI4FromStr
strncpy
_CxxThrowException
_strlwr
_stricmp
_adjust_fdiv
_initterm
_onexit
__dllonexit
strrchr
abort
atoi
wcscpy
??1type_info@@UAE@XZ
strlen
strchr
strcmp
strstr
sprintf
wcsstr
_wcsicmp
memset
??2@YAPAXI@Z
??3@YAXPAX@Z
_purecall
memcpy
free
realloc
malloc
memcmp
strcat
strcpy
wcslen
_wcslwr
InternetReadFile
InternetOpenUrlA
InternetOpenA
InternetCloseHandle
connect
ioctlsocket
htons
inet_ntoa
select
send
recv
__WSAFDIsSet
WSACleanup
WSAStartup
gethostbyname
closesocket
socket
shutdown
inet_addr
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ