DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
InstantAccess
P2EProc
Socksify
UnSocksify
Behavioral task
behavioral1
Sample
bf647a1d55c0208b2acd3a34043dc2d5_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
bf647a1d55c0208b2acd3a34043dc2d5_JaffaCakes118.dll
Resource
win10v2004-20241007-en
Target
bf647a1d55c0208b2acd3a34043dc2d5_JaffaCakes118
Size
176KB
MD5
bf647a1d55c0208b2acd3a34043dc2d5
SHA1
a78e6800d417e3cf104878fdecebace2e7760fe6
SHA256
f6b0df5f84e29476f1479ae68a283c70cdbda201dde8fed1c8ff78fdcae78988
SHA512
2c021f8af94aec8b805cde715a005e2eb1f612df66c76972458fbd7d99aa16644fd22f21f2f578737fea73653a3378e1eb7640d8ae80db0888576e491f2aa3ac
SSDEEP
3072:1FIcnxeZ7q+edZnYAeoCuPIw8n4BXhTKSdEnl3Fz3n+c7i4HyuI:Fx2e3YARCurXhdcOiI
gozi
Checks for missing Authenticode signature.
resource |
---|
bf647a1d55c0208b2acd3a34043dc2d5_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
CreateProcessA
FlushInstructionCache
lstrcmpA
VirtualProtect
GetCurrentProcess
FreeLibrary
LoadLibraryA
SetLastError
GetFileSize
GetLastError
CreateFileA
WriteFile
GlobalAlloc
Sleep
DeleteFileA
CopyFileA
LocalAlloc
CreateDirectoryA
SetFilePointer
FindNextFileA
FindFirstFileA
ReadFile
GlobalFree
GetModuleFileNameA
CreateThread
GetWindowsDirectoryA
SizeofResource
LoadResource
FindResourceA
TerminateProcess
OpenProcess
LockResource
GetProcAddress
TlsSetValue
TlsAlloc
ExitProcess
TlsFree
DisableThreadLibraryCalls
lstrlenW
CreatePipe
GetCurrentProcessId
CreateMutexA
OpenMutexA
DuplicateHandle
Process32Next
Process32First
CreateToolhelp32Snapshot
WaitForSingleObject
CloseHandle
OutputDebugStringA
lstrcatA
lstrcpyA
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
LocalFree
WideCharToMultiByte
lstrlenA
InterlockedDecrement
InterlockedIncrement
MultiByteToWideChar
GetVersionExA
GetSystemDirectoryA
TerminateThread
GetWindowPlacement
EndDialog
GetOpenClipboardWindow
CloseClipboard
GetClipboardData
OpenClipboard
CharLowerA
GetDlgItemTextA
KillTimer
GetSystemMetrics
GetWindowRect
SetWindowPos
DialogBoxParamA
FindWindowA
CharUpperBuffA
SetTimer
CharLowerBuffA
CreatePopupMenu
GetDC
SetWindowsHookExA
UnhookWindowsHookEx
GetDlgItem
PostMessageA
SetWindowLongA
CallNextHookEx
LoadCursorA
CopyIcon
CopyImage
SetSystemCursor
LoadStringA
InsertMenuA
TrackPopupMenu
GetCursorPos
GetForegroundWindow
SetForegroundWindow
DestroyMenu
SendMessageA
SetWindowTextA
MessageBoxA
ShowWindow
MoveWindow
GetWindowLongA
SetParent
GetWindowThreadProcessId
LoadImageA
IsWindow
SetDlgItemTextA
GetDIBits
CreateFontA
GetObjectA
RegCreateKeyExA
RegCloseKey
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
RegDeleteValueA
RegDeleteKeyA
RegEnumKeyExA
RegQueryInfoKeyA
ShellExecuteA
Shell_NotifyIconA
SHChangeNotify
CoMarshalInterThreadInterfaceInStream
CoCreateInstance
CoGetInterfaceAndReleaseStream
CoInitialize
CoUninitialize
VariantClear
LoadRegTypeLi
SysStringLen
SysAllocStringLen
VariantInit
SysFreeString
SysAllocString
SysAllocStringByteLen
recv
connect
send
ntohs
getpeername
WSAConnect
socket
gethostbyname
WSAGetLastError
htons
getsockopt
select
closesocket
inet_addr
InternetAutodial
InternetSetOptionA
InternetConnectA
InternetGetConnectedState
InternetCanonicalizeUrlA
GetUrlCacheEntryInfoA
InternetOpenA
ord30
ord11
ord10
ord58
ord32
ord23
ord21
ord16
ord15
ord18
ord57
ord52
ord53
URLOpenBlockingStreamA
GetAdaptersInfo
GetIfEntry
atol
_CxxThrowException
_mbsinc
_msize
_mbslwr
memset
_mbschr
wcslen
memcpy
__CxxFrameHandler
??2@YAPAXI@Z
strcpy
??3@YAXPAX@Z
strcmp
memcmp
_except_handler3
_mbsstr
_mbsrchr
vsprintf
_mbclen
strlen
sprintf
_mbsnbcmp
_ismbcdigit
atoi
_mbscmp
fclose
fwrite
fopen
strrchr
strchr
realloc
malloc
strstr
time
_purecall
??1type_info@@UAE@XZ
_adjust_fdiv
_initterm
memmove
free
__dllonexit
strncmp
_onexit
?terminate@@YAXXZ
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
InstantAccess
P2EProc
Socksify
UnSocksify
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ