DllCanUnloadNow
DllGetClassObject
DllMain
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
53ddffe12c16e94ebe894b5937c3ec89_JaffaCakes118.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
53ddffe12c16e94ebe894b5937c3ec89_JaffaCakes118.dll
Resource
win10v2004-20241007-en
Target
53ddffe12c16e94ebe894b5937c3ec89_JaffaCakes118
Size
1.0MB
MD5
53ddffe12c16e94ebe894b5937c3ec89
SHA1
a19403841fc32c9b696e3a355f02f3f402d0e290
SHA256
aef1c00c819ad816df32573ed64bb8ed3e210e09818eeb682d29a1703de09359
SHA512
d75ce453bc4ae25e4f80838793dde9bf1b68f9c3d15846b83e5a38277e06b9acf01dbcd8faa81f415b7f71a755616f36e6a42cd1670e4ddb45084c26f440bf61
SSDEEP
1536:P1miSx4ftVPg4IN4IZfRWaQC9Uux20nJIiUt2lh3iT//h7BJPTU0eBb4A00piFr1:P9SWvPg9N4IZfgOT20nJIPtC5Y7fRbT
Checks for missing Authenticode signature.
resource |
---|
53ddffe12c16e94ebe894b5937c3ec89_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetLocaleInfoA
GetThreadLocale
GetVersionExA
WideCharToMultiByte
FindResourceA
SizeofResource
LockResource
LoadResource
FindResourceExA
CreateMutexA
GetModuleFileNameA
CreateFileA
WriteFile
GetFileSize
CreateFileMappingA
EnterCriticalSection
LeaveCriticalSection
GetModuleHandleA
lstrcpyA
RaiseException
lstrcmpiA
lstrcpynA
IsDBCSLeadByte
GetLastError
GetLocalTime
SystemTimeToFileTime
GetTempPathA
GetACP
GlobalAlloc
GlobalFree
lstrlenW
lstrlenA
InitializeCriticalSection
DeleteCriticalSection
InterlockedIncrement
InterlockedDecrement
lstrcatA
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
ExitProcess
GetProcessHeap
HeapSize
HeapReAlloc
HeapFree
HeapAlloc
InterlockedExchange
OpenFileMappingA
OpenEventA
CloseHandle
OpenMutexA
ResetEvent
SetEvent
UnmapViewOfFile
ReleaseMutex
MapViewOfFile
WaitForSingleObject
LocalFree
MultiByteToWideChar
HeapDestroy
GetPrivateProfileStringA
LoadStringA
CharNextA
RegCreateKeyExA
RegEnumKeyExA
RegDeleteKeyA
RegCloseKey
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
RegQueryInfoKeyA
SHGetFileInfoA
CoCreateInstance
StringFromGUID2
CreateStreamOnHGlobal
StringFromCLSID
CoTaskMemFree
VarUI4FromStr
SysAllocString
VariantChangeType
SysStringLen
SysFreeString
LoadRegTypeLi
LoadTypeLi
VariantInit
VariantClear
DispCallFunc
VariantCopy
RegisterTypeLi
UnRegisterTypeLi
PathAppendA
SHDeleteKeyA
PathFindExtensionA
?_Nomemory@std@@YAXXZ
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@ABV01@@Z
?rfind@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDI@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?c_str@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEPBDXZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@PBD@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
??Y?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@PBD@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?erase@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@II@Z
??Y?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@D@Z
??Y?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@ABV01@@Z
_resetstkoflw
_onexit
__dllonexit
_callnewh
memset
_except_handler3
_CxxThrowException
??0exception@@QAE@ABQBD@Z
?what@exception@@UBEPBDXZ
__CxxFrameHandler
wcsncpy
_purecall
??_V@YAXPAX@Z
free
vswprintf
_vscwprintf
__security_error_handler
__CppXcptFilter
_adjust_fdiv
_initterm
?terminate@@YAXXZ
??3@YAXPAX@Z
malloc
atoi
_mbsnbcpy
sprintf
memchr
_mbsinc
??0exception@@QAE@XZ
??0exception@@QAE@ABV0@@Z
??1exception@@UAE@XZ
memmove
_mbsicmp
realloc
_mbschr
_atoi64
mbstowcs
wcslen
wcscpy
wcsstr
_mbslwr
_mbscmp
_mbsstr
_mbsrchr
??1type_info@@UAE@XZ
DllCanUnloadNow
DllGetClassObject
DllMain
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ