DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_7b1501ec74fc4a75557ebd816b5dddf0.dll
Resource
win7-20241010-en
Target
JaffaCakes118_7b1501ec74fc4a75557ebd816b5dddf0
Size
872KB
MD5
7b1501ec74fc4a75557ebd816b5dddf0
SHA1
c096cf0ef34a92b7de8a2e6f61fb74c9c424187c
SHA256
44c0f3ce768bd7657c401cd20f14519e62a755dba639077282b96339aacedb5d
SHA512
9443c6b35a79531548bfbe2a7335db7e87a4e8c38c9ddc0310b0c256b9a863153c62a952319126ae69b9d3b992570361fef27c59ada19d17b295a0d87007aa80
SSDEEP
12288:MVy/6EudYO3FBgAX1avly7e6+Z0+w2KunEhoy0n3xaqjFSyclQhuK:MYxO3XXsly7e6+Z9wwMAn3hFOlQhB
Checks for missing Authenticode signature.
resource |
---|
JaffaCakes118_7b1501ec74fc4a75557ebd816b5dddf0 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
FindResourceA
GetLastError
LoadLibraryExA
lstrcmpiA
lstrcpynA
IsDBCSLeadByte
DisableThreadLibraryCalls
InitializeCriticalSection
HeapDestroy
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
lstrcpyA
lstrcatA
GetProcAddress
LoadLibraryA
InterlockedDecrement
InterlockedIncrement
GetTickCount
InterlockedExchangeAdd
CreateSemaphoreA
CloseHandle
GetCurrentProcessId
WaitForSingleObject
ReleaseSemaphore
GetTempPathA
OutputDebugStringA
InterlockedExchange
LoadResource
GetVersionExA
LocalFree
LocalAlloc
SetErrorMode
CreateMutexA
FormatMessageA
ReleaseMutex
GetLocaleInfoW
GetProcessHeap
SetEndOfFile
ReadFile
IsBadCodePtr
IsBadReadPtr
GetStringTypeW
GetStringTypeA
IsValidCodePage
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
VirtualQuery
GetSystemInfo
VirtualProtect
CreateFileA
SetStdHandle
SizeofResource
FreeLibrary
WideCharToMultiByte
GetModuleFileNameA
GetShortPathNameA
lstrlenA
MultiByteToWideChar
lstrlenW
GetCurrentThreadId
GetEnvironmentStringsW
FreeEnvironmentStringsW
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
SetThreadPriority
CreateThread
Sleep
CreateEventA
WaitForMultipleObjects
FindNextChangeNotification
ResetEvent
SetEvent
HeapAlloc
HeapFree
RtlUnwind
GetSystemTimeAsFileTime
HeapReAlloc
RaiseException
GetDriveTypeA
GetCurrentDirectoryA
GetFullPathNameA
SetEnvironmentVariableA
SetCurrentDirectoryA
GetCommandLineA
ExitProcess
GetModuleHandleA
SetConsoleCtrlHandler
GetTimeFormatA
GetDateFormatA
LCMapStringA
LCMapStringW
CompareStringA
GetCPInfo
CompareStringW
HeapSize
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
SetLastError
GetTimeZoneInformation
GetACP
GetOEMCP
WriteFile
SetFilePointer
FlushFileBuffers
SetUnhandledExceptionFilter
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
GetEnvironmentStrings
GetOverlappedResult
wsprintfA
CharNextA
wvsprintfA
CoTaskMemRealloc
CoCreateInstance
StringFromIID
CoTaskMemAlloc
CoTaskMemFree
RegisterTypeLi
SysAllocString
SysFreeString
SysAllocStringLen
SysStringLen
LoadTypeLi
VarUI4FromStr
SetupDiOpenClassRegKey
RegOpenKeyA
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
RegQueryValueExA
RegEnumValueA
RegQueryInfoKeyA
RegSetValueExA
RegEnumKeyExA
RegOpenKeyExA
RegCloseKey
RegDeleteValueA
RegCreateKeyExA
RegDeleteKeyA
RegEnumKeyA
UuidCreate
getsockname
ntohs
htons
inet_addr
ioctlsocket
recv
send
connect
socket
gethostbyname
inet_ntoa
getpeername
__WSAFDIsSet
WSAStartup
WSACleanup
gethostname
WSAGetLastError
bind
listen
accept
WSACloseEvent
WSAEventSelect
closesocket
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE