DllCanUnloadNow
DllGetClassObject
DllRegisterServer
Static task
static1
Behavioral task
behavioral1
Sample
36e7dd4ec24c5297302fd660428f5c09_JaffaCakes118.dll
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
36e7dd4ec24c5297302fd660428f5c09_JaffaCakes118.dll
Resource
win10v2004-20241007-en
Target
36e7dd4ec24c5297302fd660428f5c09_JaffaCakes118
Size
47KB
MD5
36e7dd4ec24c5297302fd660428f5c09
SHA1
c1bed57417df15c5f163bba10a41f7d4691a9c67
SHA256
11e7ef9036689f22f030de5ec26bd5f17cfaec9af5f29feb2d4d1fa354518baf
SHA512
44dbb96c171678cad7517d888fa495f932c358960ba0d4614bb70a40747f482da9473d476106500225c09b5420efb0e574e6b83c2733483f0229ccb418007ce1
SSDEEP
768:ilPjqvwdm011bJ2TdzOS0Q/WuJDDzHNyoZb88qzGGQTw:ilPjawdm0UTdx0Q/nJDDztyoh88YXQM
Checks for missing Authenticode signature.
resource |
---|
36e7dd4ec24c5297302fd660428f5c09_JaffaCakes118 |
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
lstrcpyW
GetTickCount
ExitThread
lstrlenW
CloseHandle
GetVersionExA
GetSystemDirectoryA
lstrcatW
GetModuleHandleA
GetProcessHeap
HeapFree
IsBadStringPtrA
lstrcmpA
GetProcAddress
MultiByteToWideChar
WideCharToMultiByte
GetModuleFileNameA
GetCurrentDirectoryA
GetWindowsDirectoryA
SetEvent
PulseEvent
WaitForSingleObject
ResetEvent
HeapAlloc
HeapReAlloc
lstrlenA
CompareStringW
Sleep
lstrcatA
SetFilePointer
CreateFileA
ReleaseMutex
SetEndOfFile
GetModuleHandleW
CreateEventA
CreateMutexW
CreateThread
ReadFile
WriteFile
WriteProcessMemory
GetCurrentProcess
VirtualProtect
lstrcmpiA
lstrcpyA
CharUpperW
wsprintfA
CharLowerA
wsprintfW
GetForegroundWindow
InitializeSecurityDescriptor
CryptReleaseContext
CryptDestroyKey
CryptDestroyHash
RegOpenKeyExA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
CryptEncrypt
CryptDeriveKey
CryptHashData
CryptCreateHash
CryptAcquireContextA
CryptDecrypt
SysAllocString
SysFreeString
InternetConnectA
InternetCrackUrlA
InternetCrackUrlW
CoInternetCombineUrl
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ