DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
3dab6cb4e584a09fb4ddf994cefa2a6c_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3dab6cb4e584a09fb4ddf994cefa2a6c_JaffaCakes118.dll
Resource
win10v2004-20241007-en
Target
3dab6cb4e584a09fb4ddf994cefa2a6c_JaffaCakes118
Size
48KB
MD5
3dab6cb4e584a09fb4ddf994cefa2a6c
SHA1
d9262b98f5b05d52db07cd190375ce88e70e7337
SHA256
5d0c11216be300d9a1813e751b77d543801f889b6f0c0e7a09bd453fff3a45b3
SHA512
1e2edd7a7745cacb6ecefafa4e360d4cf49f93f16fdb4c2d5d04970885581edce775c65ed2121e719cff7d66272b9699f803304a74b7a146f081e1dda42ccb40
SSDEEP
768:wdjlRT2qE+7GQKt2MxB2xhwA3Zq8mFkpg9E70Sb:wjRTDzCLtj2xu+FTg9DSb
Checks for missing Authenticode signature.
resource |
---|
3dab6cb4e584a09fb4ddf994cefa2a6c_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
CreateEventA
DeleteFileA
LeaveCriticalSection
EnterCriticalSection
WritePrivateProfileStringA
Process32Next
Process32First
Sleep
CreateThread
WideCharToMultiByte
lstrlenW
GetLastError
lstrlenA
GetWindowsDirectoryA
DisableThreadLibraryCalls
InitializeCriticalSection
DeleteCriticalSection
InterlockedDecrement
HeapAlloc
GetSystemInfo
GetVersionExA
HeapCreate
HeapDestroy
GetShortPathNameA
GetModuleHandleA
GetCommandLineW
CloseHandle
LoadLibraryA
GetProcAddress
GetLocalTime
GetCurrentProcessId
GetSystemDirectoryA
InterlockedIncrement
MultiByteToWideChar
GetModuleFileNameA
DefWindowProcA
CallNextHookEx
GetMessageA
TranslateMessage
DispatchMessageA
SendMessageA
CreateWindowExA
ShowWindow
FindWindowExA
IsWindow
RegisterClassExA
KillTimer
SetTimer
PostMessageA
SetWindowTextA
RegSetValueExA
RegCreateKeyExA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
CommandLineToArgvW
CoCreateInstance
SysStringLen
LoadRegTypeLi
SysAllocString
VariantClear
SysFreeString
_purecall
strchr
_strlwr
fopen
fwrite
fclose
rand
free
_initterm
malloc
_adjust_fdiv
_stricmp
memcmp
memcpy
??2@YAPAXI@Z
memset
strcmp
strcat
??3@YAXPAX@Z
strcpy
_access
strstr
strlen
sprintf
strrchr
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ