DllMain
SetExcel12EntryPt
XLCallVer
xlAutoOpen
Static task
static1
Behavioral task
behavioral1
Sample
415abfb2785209977e7293d58e6ec29345a1be9dc343ae69f17e96c5346f9fe7.xll
Resource
win7-20240729-en
Target
JaffaCakes118_21f835ee382f4e48669282b0a3acbe667ebf0146ff45daaccdd51ae713b9ae63
Size
31KB
MD5
33f32946aef88800406db834ec6f8181
SHA1
f2cf3a86629c353069854f0b93fbbe8dc6acecd7
SHA256
21f835ee382f4e48669282b0a3acbe667ebf0146ff45daaccdd51ae713b9ae63
SHA512
be43c1fa21cd4c2738a8137eef166ba7e747e56b847606cb070f6adf15aa3ed91af32442f30a3555a07e03d6fab3bd7ea6ac3a26beef01d5f8e61344bc6a94b7
SSDEEP
768:LlLDSuadLpBgwHJJ53smg4hsmVCBUMmRS:LlnQBgwHPfNhsmVk
Checks for missing Authenticode signature.
resource |
---|
unpack001/415abfb2785209977e7293d58e6ec29345a1be9dc343ae69f17e96c5346f9fe7 |
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
?_Pninc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAPEADXZ
?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z
??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAA@XZ
?showmanyc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JXZ
?xsgetn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JPEAD_J@Z
??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ
??1?$basic_ostream@DU?$char_traits@D@std@@@std@@UEAA@XZ
?write@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@PEBD_J@Z
?always_noconv@codecvt_base@std@@QEBA_NXZ
??Bid@locale@std@@QEAA_KXZ
?_Gninc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAPEADXZ
?out@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEBD1AEAPEBDPEAD3AEAPEAD@Z
?in@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEBD1AEAPEBDPEAD3AEAPEAD@Z
??0?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z
??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ
?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXXZ
?unshift@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEAD1AEAPEAD@Z
?getloc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEBA?AVlocale@2@XZ
?_Xlength_error@std@@YAXPEBD@Z
??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ
?_Getcat@?$codecvt@DDU_Mbstatet@@@std@@SA_KPEAPEBVfacet@locale@2@PEBV42@@Z
?_Fiopen@std@@YAPEAU_iobuf@@PEBDHH@Z
?id@?$codecvt@DDU_Mbstatet@@@std@@2V0locale@2@A
?_Getgloballocale@locale@std@@CAPEAV_Locimp@12@XZ
??0_Lockit@std@@QEAA@H@Z
??1_Lockit@std@@QEAA@XZ
?xsputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JPEBD_J@Z
RtlVirtualUnwind
GetSystemTimeAsFileTime
GetCurrentThreadId
GetCurrentProcessId
QueryPerformanceCounter
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsDebuggerPresent
RtlLookupFunctionEntry
RtlCaptureContext
GetModuleHandleW
GetProcAddress
CreateProcessW
CloseHandle
GetEnvironmentVariableW
InitializeSListHead
__std_exception_destroy
__std_exception_copy
__C_specific_handler
_CxxThrowException
memset
__std_type_info_destroy_list
memcpy
memmove
_initterm_e
_invalid_parameter_noinfo_noreturn
_cexit
_initterm
_seh_filter_dll
_configure_narrow_argv
_crt_atexit
_initialize_onexit_table
_register_onexit_function
_execute_onexit_table
_initialize_narrow_environment
_fseeki64
fread
fsetpos
ungetc
setvbuf
fgetpos
fwrite
fgetc
fclose
fflush
fputc
_get_stream_buffer_pointers
_lock_file
_unlock_file
getenv
malloc
free
_callnewh
ord1
DllMain
SetExcel12EntryPt
XLCallVer
xlAutoOpen
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ