DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
3ba166fa8b41569217d9aac45c6e573a_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3ba166fa8b41569217d9aac45c6e573a_JaffaCakes118.dll
Resource
win10v2004-20241007-en
Target
3ba166fa8b41569217d9aac45c6e573a_JaffaCakes118
Size
162KB
MD5
3ba166fa8b41569217d9aac45c6e573a
SHA1
03895b3d68f57e143760e8713b59a4138c4ef5e1
SHA256
c7aeff9c47684c8043ee1c76c496ddfaca6042990ba7fe2ce9cebf222f877c63
SHA512
569a8b1a7bb603968125491f5a3c080c12c80f41b544ab4fa19003ae68bc52fd4125ac179133eb14d7b27bbce2f4352031655abfdbe71ec890a66be10cd1e6bf
SSDEEP
3072:7c/m5eDc+kJWB53etOn3cQIPxFP803WMu+Pzj3I04Ff3lpUEWUJflqg:7c/m5fWDrn3cQyE4xP/FvEXlqg
Checks for missing Authenticode signature.
resource |
---|
3ba166fa8b41569217d9aac45c6e573a_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
ReleaseMutex
WaitForSingleObject
GetTickCount
DisableThreadLibraryCalls
HeapAlloc
GetSystemInfo
GetVersionExW
HeapCreate
GetShortPathNameW
FreeLibrary
MultiByteToWideChar
SizeofResource
LoadResource
FindResourceW
LoadLibraryExW
lstrcmpiW
lstrcpynW
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
HeapDestroy
DeleteCriticalSection
GetProcAddress
LoadLibraryW
lstrcpyW
lstrcatW
GetVersion
GetVolumeInformationW
GetTempFileNameW
GetTempPathW
lstrcpynA
WideCharToMultiByte
ResumeThread
VirtualQuery
InterlockedCompareExchange
GetCurrentThreadId
VirtualProtect
FlushInstructionCache
GetCurrentProcess
GetLastError
SetThreadContext
SuspendThread
VirtualAlloc
SetLastError
LoadLibraryA
CreateMutexW
RaiseException
InterlockedExchange
LocalAlloc
GetThreadLocale
GetStringTypeExW
InterlockedDecrement
OutputDebugStringW
DebugBreak
lstrlenA
InterlockedIncrement
lstrcmpW
WritePrivateProfileStringW
CreateProcessW
OpenMutexW
CloseHandle
GetModuleFileNameW
GetModuleHandleW
CreateDirectoryW
GetPrivateProfileStringW
GetDriveTypeW
GetWindowsDirectoryW
lstrlenW
GetFileAttributesW
GetCurrentThread
GetCurrentProcessId
GetEnvironmentVariableW
GetProcessHeap
TlsAlloc
SetEnvironmentVariableW
TlsFree
HeapFree
RemoveDirectoryW
DeleteFileW
MoveFileW
GetThreadContext
MoveFileExW
SetMenuItemBitmaps
InsertMenuW
wsprintfW
LoadImageW
DrawTextW
InsertMenuItemW
GetSystemMetrics
LoadStringW
wvsprintfW
CharNextW
GetDC
ReleaseDC
CharLowerW
SystemParametersInfoW
GetSysColor
RegCloseKey
RegOpenKeyExW
RegSetValueExW
RegCreateKeyExW
RegDeleteKeyW
RegDeleteValueW
RegQueryValueExW
RegEnumKeyExW
RegQueryInfoKeyW
RegEnumValueW
SHFileOperationW
SHGetSpecialFolderLocation
SHGetPathFromIDListW
SHGetSpecialFolderPathW
DragQueryFileW
CoCreateInstance
ReleaseStgMedium
CoTaskMemAlloc
CoUninitialize
CoInitialize
StringFromGUID2
CoTaskMemFree
CoTaskMemRealloc
SysAllocString
SysStringLen
RegisterTypeLi
LoadTypeLi
SysFreeString
VarUI4FromStr
LoadRegTypeLi
PathIsNetworkPathW
PathSkipRootW
PathFileExistsW
SHDeleteKeyW
memcpy
memcmp
memset
__CxxFrameHandler
free
malloc
realloc
_purecall
wcsrchr
_except_handler3
__dllonexit
_onexit
_initterm
_adjust_fdiv
??2@YAPAXI@Z
wcsncat
_wcsicmp
_wcsnicmp
wcslen
?terminate@@YAXXZ
_CxxThrowException
_snwprintf
swprintf
swscanf
??1type_info@@UAE@XZ
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ