DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
56f6c8553676bbb66869b5a257be42ae_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
56f6c8553676bbb66869b5a257be42ae_JaffaCakes118.dll
Resource
win10v2004-20241007-en
Target
56f6c8553676bbb66869b5a257be42ae_JaffaCakes118
Size
48KB
MD5
56f6c8553676bbb66869b5a257be42ae
SHA1
0d961da6ae504783f1b7772ef00c2dcf97835843
SHA256
ec3d5a806e3f1d599651926ee498e6e73c2709d576c97cc0513d40e5b84350cc
SHA512
3f85125734258bd62493aa8c57bc5ef515da319f8436f041e9c9eb49048372dcd3cf56a01de69ad23bc537e14f8cc007246e513213802be381e1e8aa91d37b1a
SSDEEP
768:klRTKlbWALZ9orN6dqpcihjHibbHSclA5c83YDf7fsx9AJhim4rjQX/e71Zv:kD2bWyz0NzZT0bHpG3Yr70Qim4me
Checks for missing Authenticode signature.
resource |
---|
56f6c8553676bbb66869b5a257be42ae_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
EnterCriticalSection
InterlockedDecrement
HeapAlloc
GetSystemInfo
GetVersionExA
HeapCreate
HeapDestroy
lstrlenW
MultiByteToWideChar
lstrlenA
GetShortPathNameA
GetModuleHandleA
GetLocalTime
CloseHandle
Process32Next
InterlockedIncrement
GetSystemDirectoryA
GetLastError
Sleep
CreateThread
WideCharToMultiByte
GetCurrentProcessId
GetCommandLineW
WritePrivateProfileStringA
GetWindowsDirectoryA
CreateEventA
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
DisableThreadLibraryCalls
LoadLibraryA
GetProcAddress
GetModuleFileNameA
Process32First
DeleteFileA
CallNextHookEx
FindWindowExA
KillTimer
SetTimer
GetMessageA
DispatchMessageA
DefWindowProcA
IsWindow
SetWindowTextA
SendMessageA
PostMessageA
CreateWindowExA
ShowWindow
RegisterClassExA
TranslateMessage
RegSetValueExA
RegCreateKeyExA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
CommandLineToArgvW
CoCreateInstance
SysAllocString
VariantClear
SysStringLen
LoadRegTypeLi
SysFreeString
strchr
fopen
_stricmp
fwrite
fclose
strcat
strrchr
free
_initterm
malloc
_adjust_fdiv
_strlwr
rand
strcmp
memcmp
memcpy
??2@YAPAXI@Z
_purecall
strcpy
strstr
strlen
memset
??3@YAXPAX@Z
_access
sprintf
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ