DllInstall
__apicall
_init
_uninstall
serv
Static task
static1
Behavioral task
behavioral1
Sample
3c0948c9f4ccc0346d59b39dfedab2d2_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3c0948c9f4ccc0346d59b39dfedab2d2_JaffaCakes118.dll
Resource
win10v2004-20241007-en
Target
3c0948c9f4ccc0346d59b39dfedab2d2_JaffaCakes118
Size
1.7MB
MD5
3c0948c9f4ccc0346d59b39dfedab2d2
SHA1
60ce765958b91d0ea8b1d88d71998c4e1ffeda60
SHA256
3325967bf2c4d6342a51b2d2149a306ae313071b201ca174178350e214b08471
SHA512
b1ac7a93b6871f248ec31157733fee1a200a00768fb77de3cb4f3d0b6d8ab7377a0ca6939259e7f9af713f7d9b7028afa7e194f6d3b976bf2fc24e4cba0ece3e
SSDEEP
24576:QujmhsO88E1qdgM1oVxcpA+0hTHwDheg3W6UY4Iu2nii9e5YWicSdtnPgV:QXhs0gq1orAuWhp39lk3Y95PnIV
Checks for missing Authenticode signature.
resource |
---|
3c0948c9f4ccc0346d59b39dfedab2d2_JaffaCakes118 |
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
VirtualAlloc
VirtualFree
GetProcessHeap
HeapAlloc
HeapFree
LoadLibraryA
GetLastError
GetTickCount
GetProcAddress
GetModuleHandleA
Sleep
GetModuleFileNameW
GetTempPathW
GetEnvironmentVariableW
IsProcessorFeaturePresent
GetCommandLineA
GetCurrentThreadId
InterlockedDecrement
ExitProcess
GetModuleHandleExW
MultiByteToWideChar
GetStdHandle
WriteFile
HeapSize
RaiseException
IsDebuggerPresent
InterlockedIncrement
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetStringTypeW
SetLastError
WideCharToMultiByte
GetFileType
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
GetStartupInfoW
GetModuleFileNameA
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetEnvironmentStringsW
FreeEnvironmentStringsW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleW
EnterCriticalSection
LeaveCriticalSection
LoadLibraryExW
OutputDebugStringW
LoadLibraryW
HeapReAlloc
RtlUnwind
LCMapStringW
GetConsoleCP
GetConsoleMode
SetFilePointerEx
SetStdHandle
WriteConsoleW
FlushFileBuffers
CreateFileW
CloseHandle
DllInstall
__apicall
_init
_uninstall
serv
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ