DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
2f60f169f115e2dcf5f8c78ebe6f911a_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2f60f169f115e2dcf5f8c78ebe6f911a_JaffaCakes118.dll
Resource
win10v2004-20241007-en
Target
2f60f169f115e2dcf5f8c78ebe6f911a_JaffaCakes118
Size
148KB
MD5
2f60f169f115e2dcf5f8c78ebe6f911a
SHA1
4454120002db0c791621dc67e068f2db78888c01
SHA256
9365dbee205afb94544ce8ac643f2208780bdb41e8d7cc8043e870d7eca8a4ec
SHA512
c09554a56143a34635ab2166f7b90bcee95fbef4ffb67df455582606d69f274d4dc2b51e6dd87afc08f32fc5f9ed8b60f1d567ac054eb3fa9d3e1daadcd763b5
SSDEEP
3072:sV59qBaWeoXhQm/pbs5oOlPEv+A8c48dmT69msYg0PFghW:6kLpQqbvOlPERdU6ksYh
Checks for missing Authenticode signature.
resource |
---|
2f60f169f115e2dcf5f8c78ebe6f911a_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
??1CHPRBIniHandler@@UAE@XZ
?GetStringValue@CHPRBIniHandler@@QAEJPBD00AAPAD@Z
??0CHPRBIniHandler@@QAE@XZ
?GetIntegerValue@CHPRBIniHandler@@QAEHPBD0H@Z
ord6118
ord781
ord304
ord2322
ord310
ord970
ord1003
ord5459
ord3872
ord1230
ord300
ord6703
ord1167
ord371
ord1098
ord1208
ord1206
ord1092
ord1037
ord1084
ord299
ord2902
ord876
ord1489
ord578
ord265
ord762
ord1917
ord2248
ord314
ord315
ord765
ord1049
ord3830
ord266
ord581
ord6754
ord3296
ord531
ord757
ord4038
ord4014
ord6278
ord3801
ord6276
ord4326
ord2063
ord2018
ord5583
ord3806
ord1010
ord5102
ord6219
ord5382
ord3832
ord1209
ord1920
ord2931
ord5224
ord5226
ord3948
ord4568
ord5230
ord5213
ord5566
ord2537
ord2731
ord2835
ord4307
ord2714
ord2838
ord2540
ord2646
ord2533
ord3718
ord3719
ord3709
ord2644
ord3949
ord4481
ord4261
ord3333
ord566
ord3683
ord723
ord1191
ord1185
ord1187
ord764
ord1177
ord1175
ord1201
ord1120
__clean_type_info_names_internal
_crt_debugger_hook
?_type_info_dtor_internal_method@type_info@@QAEXXZ
__CppXcptFilter
_adjust_fdiv
_amsg_exit
_initterm_e
_initterm
_encoded_null
_malloc_crt
_decode_pointer
_onexit
_lock
__dllonexit
_encode_pointer
_unlock
?terminate@@YAXXZ
_except_handler4_common
_mbscmp
_splitpath
_wcsicmp
strcpy
_CxxThrowException
strcat
_mbsupr
_mbslwr
_mbsstr
_mbsrchr
_mbsnbcpy
_mbschr
sprintf
_recalloc
__CxxFrameHandler3
_purecall
_resetstkoflw
memset
strcat_s
wcsncpy_s
strcpy_s
memcpy_s
free
malloc
_mbsnbcpy_s
memcmp
strlen
CloseHandle
GetCurrentProcessId
CreateSemaphoreA
CreateEventA
GetModuleHandleA
LoadLibraryExA
FindResourceA
LoadResource
SizeofResource
FreeLibrary
IsDBCSLeadByte
GetModuleFileNameA
InterlockedDecrement
InterlockedIncrement
lstrcmpiA
lstrlenA
GetLastError
DeleteCriticalSection
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
RaiseException
lstrlenW
WideCharToMultiByte
WaitForSingleObject
GetVersionExA
InterlockedExchange
LocalFree
LocalAlloc
Sleep
InterlockedCompareExchange
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetSystemTimeAsFileTime
GetACP
SetEvent
ReleaseSemaphore
Process32Next
Process32First
GetThreadLocale
CreateToolhelp32Snapshot
GetShortPathNameA
FindClose
MultiByteToWideChar
GetLocaleInfoA
FindFirstFileA
UnregisterClassA
CharNextA
RegEnumKeyExA
RegQueryInfoKeyA
RegSetValueExA
RegOpenKeyExA
RegCreateKeyExA
RegCloseKey
RegDeleteValueA
RegDeleteKeyA
RegQueryValueExA
ShellExecuteA
CoTaskMemRealloc
CoTaskMemFree
CoCreateInstance
StringFromGUID2
CoTaskMemAlloc
SysAllocString
LoadTypeLi
UnRegisterTypeLi
RegisterTypeLi
VarUI4FromStr
LoadRegTypeLi
SysAllocStringByteLen
SysStringByteLen
VariantClear
SafeArrayUnaccessData
SafeArrayAccessData
VariantInit
SysStringLen
GetErrorInfo
SysFreeString
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ