DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
535c43f1a0bcb586fa8e6d47ad7bf234_JaffaCakes118.dll
Resource
win7-20240903-en
Target
535c43f1a0bcb586fa8e6d47ad7bf234_JaffaCakes118
Size
210KB
MD5
535c43f1a0bcb586fa8e6d47ad7bf234
SHA1
418cd597ae6b0b5ccf4c010ceba5876a4bc83f50
SHA256
82822ba4692609e29252e7ad682e37bc59b1a9208ac637769b57238aa1c90ff5
SHA512
e55f40c0b212a3c00f436685d18e27f0a1f9cea831efc809f84e2905cc256b758c635aa0cf03c1b84130d54b443f4670612a22142f174638f5b807ba67e1ec11
SSDEEP
3072:Iyt2kDRiBykHdAcMjWLDLPAdZVxhlcEQqluB:Iyt5ZeHPKcBV
Checks for missing Authenticode signature.
resource |
---|
535c43f1a0bcb586fa8e6d47ad7bf234_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
LoadResource
FindResourceW
GetLastError
LoadLibraryExW
lstrcmpiW
lstrcpynW
HeapDestroy
GetProcAddress
LoadLibraryW
lstrcpyW
lstrcatW
GetLocalTime
Sleep
CreateFileA
GetTempPathA
FlushFileBuffers
WriteFile
DeleteFileA
DeviceIoControl
WideCharToMultiByte
IsBadReadPtr
SizeofResource
GetModuleHandleA
GetCurrentProcess
DebugBreak
SetErrorMode
OpenEventA
ExitProcess
OutputDebugStringA
LoadLibraryA
GetWindowsDirectoryA
VirtualAlloc
VirtualFree
LocalFree
SetStdHandle
GetOEMCP
GetACP
GetCPInfo
lstrlenA
MultiByteToWideChar
FreeLibrary
GetModuleFileNameW
GetModuleHandleW
GetShortPathNameW
lstrlenW
InterlockedDecrement
EnterCriticalSection
InterlockedIncrement
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
CloseHandle
CreateThread
DisableThreadLibraryCalls
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
GetCurrentProcessId
GetStringTypeW
GetStringTypeA
SetFilePointer
IsBadCodePtr
SetUnhandledExceptionFilter
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
SetHandleCount
GetStdHandle
LCMapStringW
LCMapStringA
HeapSize
TerminateProcess
IsBadWritePtr
HeapCreate
GetVersionExA
GetEnvironmentVariableA
GetModuleFileNameA
GetVersion
GetCommandLineA
HeapReAlloc
HeapAlloc
HeapFree
RtlUnwind
RaiseException
CharNextW
CharLowerW
MessageBoxW
SetWindowLongW
wsprintfA
RegDeleteKeyA
RegOpenKeyExA
RegQueryValueExA
RegEnumValueW
RegQueryInfoKeyW
RegSetValueExW
RegEnumKeyExW
RegOpenKeyExW
RegCloseKey
RegDeleteValueW
RegCreateKeyExW
RegDeleteKeyW
CoTaskMemAlloc
CoTaskMemRealloc
CoCreateInstance
CoTaskMemFree
VarUI4FromStr
SysFreeString
SysAllocString
LoadTypeLi
RegisterTypeLi
LoadRegTypeLi
SysStringLen
SysAllocStringLen
VariantClear
InternetOpenUrlA
InternetOpenA
InternetReadFile
InternetCloseHandle
HttpQueryInfoA
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ