DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
573d298a6ad532e9273bfc40dca7e6ca_JaffaCakes118.dll
Resource
win7-20240708-en
Target
573d298a6ad532e9273bfc40dca7e6ca_JaffaCakes118
Size
266KB
MD5
573d298a6ad532e9273bfc40dca7e6ca
SHA1
2ca6adf8864ddbbccee7482892cab31fe0d379f2
SHA256
b743ffbfa2148aebe1cdd1746fe560afaa68a4e9150c35b9a0b53e6fa3b3e598
SHA512
90be491c121b661ec3636beff611c7a865377b01d7b2bbba5bb1ca616d50d5172f74043a91ca7e705a9a41e4933ec951828eb03da3a960718ea6eb87b2fd43c4
SSDEEP
3072:hWy6KX/SC+nUQ0S66vgvy+6/HFEB1RlJG:Iy7vAQi+2C10
Checks for missing Authenticode signature.
resource |
---|
573d298a6ad532e9273bfc40dca7e6ca_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
lstrlenA
SizeofResource
LoadResource
FindResourceW
GetLastError
LoadLibraryExW
lstrcpynW
lstrcpyW
lstrcatW
GetLocalTime
Sleep
ReadFile
CreateFileA
GetTempPathA
FlushFileBuffers
WriteFile
DeleteFileA
DeviceIoControl
WideCharToMultiByte
OutputDebugStringA
GetTickCount
IsBadReadPtr
GetCurrentProcessId
GetProcAddress
MultiByteToWideChar
GetCurrentProcess
DebugBreak
SetErrorMode
OpenEventA
ExitProcess
LoadLibraryA
GetWindowsDirectoryA
VirtualAlloc
VirtualFree
LocalFree
SetStdHandle
GetOEMCP
GetACP
GetCPInfo
GetStringTypeW
GetStringTypeA
SetFilePointer
IsBadCodePtr
SetUnhandledExceptionFilter
lstrcmpiW
FreeLibrary
GetModuleFileNameW
GetModuleHandleW
GetShortPathNameW
lstrlenW
InterlockedDecrement
InterlockedIncrement
EnterCriticalSection
LeaveCriticalSection
CreateThread
InitializeCriticalSection
CloseHandle
DisableThreadLibraryCalls
DeleteCriticalSection
HeapDestroy
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
GetModuleHandleA
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
SetHandleCount
GetStdHandle
LCMapStringW
LCMapStringA
HeapSize
TerminateProcess
IsBadWritePtr
HeapCreate
GetVersionExA
GetEnvironmentVariableA
GetModuleFileNameA
GetVersion
GetCommandLineA
HeapReAlloc
HeapAlloc
HeapFree
RtlUnwind
RaiseException
SetWindowLongW
wsprintfA
CharLowerW
wsprintfW
EnumChildWindows
MessageBoxW
PostMessageA
GetWindowTextA
FindWindowA
CharNextW
RegDeleteKeyA
RegOpenKeyExA
RegQueryValueExA
RegEnumValueW
RegQueryInfoKeyW
RegSetValueExW
RegOpenKeyExW
RegCreateKeyExW
RegCloseKey
RegEnumKeyExW
RegDeleteKeyW
RegDeleteValueW
CoTaskMemAlloc
CoTaskMemRealloc
OleRun
CoInitialize
CoCreateInstance
CoTaskMemFree
GetErrorInfo
VarUI4FromStr
SysFreeString
RegisterTypeLi
SysAllocString
LoadTypeLi
SysStringLen
LoadRegTypeLi
SysAllocStringLen
VariantClear
VariantInit
InternetOpenUrlA
InternetOpenA
InternetReadFile
HttpQueryInfoA
InternetCloseHandle
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ