CreateUSD
DeleteUSD
DllCanUnloadNow
DllGetClassObject
DllMain
Static task
static1
Behavioral task
behavioral1
Sample
5746f10980c2820b267d598b896ab674_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5746f10980c2820b267d598b896ab674_JaffaCakes118.dll
Resource
win10v2004-20241007-en
Target
5746f10980c2820b267d598b896ab674_JaffaCakes118
Size
114KB
MD5
5746f10980c2820b267d598b896ab674
SHA1
884e6ccb3ef4e6b0080109b5f45c3cc4c7e78813
SHA256
d64994fef3b16e737113aa2e5f611b2b23523453f1a7994dcf10c2b3a64c6a6e
SHA512
621eb3f3f4723a778aa6b424b92722a43c7b592534f4f2cb38debf67cd808fdaa3fb6cbe3c9e47536ab21c92df59f490c30a64774d14b582cc52fd8011994d0c
SSDEEP
3072:YVTPlRv9sB48ImmSy6sRVnfEZbDwZKlL/FYa:YNXVoNeSP2V0
Checks for missing Authenticode signature.
resource |
---|
5746f10980c2820b267d598b896ab674_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
ord823
ord825
GetVersion
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
RtlUnwind
OutputDebugStringA
InterlockedCompareExchange
InterlockedExchange
DisableThreadLibraryCalls
GetTempPathA
lstrlenA
MultiByteToWideChar
GetProcessHeap
HeapAlloc
HeapFree
CreateThread
SetEvent
TerminateThread
ResetEvent
lstrcmpA
FreeLibrary
GetSystemDirectoryA
LoadLibraryA
GetProcAddress
WaitForSingleObject
ReleaseMutex
Sleep
OpenMutexA
CreateMutexA
InitializeCriticalSection
CreateEventA
WideCharToMultiByte
GetWindowsDirectoryA
GetSystemDefaultLangID
CloseHandle
DeleteCriticalSection
InterlockedDecrement
InterlockedIncrement
LeaveCriticalSection
EnterCriticalSection
RegCreateKeyExA
RegDeleteValueA
RegFlushKey
RegEnumValueA
RegQueryValueExA
RegSetValueExA
RegOpenKeyExA
RegCloseKey
CoTaskMemFree
CoTaskMemAlloc
SysFreeString
SysAllocString
CreateUSD
DeleteUSD
DllCanUnloadNow
DllGetClassObject
DllMain
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ