DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_8ab5a06eab33e10eb0aeab8400db62c9.dll
Resource
win7-20240903-en
Target
JaffaCakes118_8ab5a06eab33e10eb0aeab8400db62c9
Size
96KB
MD5
8ab5a06eab33e10eb0aeab8400db62c9
SHA1
2b9bc75bb0ba0184e6a784e2e9e6f892da29db4e
SHA256
9e94633a31f7d15a46a861f3b989a9890ba6b37389c69db3012fd7d088995ca1
SHA512
3f0481d0c94351088d58f7ed7cff0887b29201ded95ee7f4951f10f8c7d3d4437b12700a2b562b43b6a921a92924ab8be4226ffddf21b7386571078847f668bb
SSDEEP
1536:X7jIKUQE5pIJRDH/0lDajJDowtVzLM+xrOLzeLyu+JsaAwK:X7jIKUQKpafCDaJowtVzLM+3yuCsapK
Checks for missing Authenticode signature.
resource |
---|
JaffaCakes118_8ab5a06eab33e10eb0aeab8400db62c9 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
FreeLibrary
DeleteCriticalSection
lstrlenW
DisableThreadLibraryCalls
IsDBCSLeadByte
lstrcpyA
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetVolumeInformationA
MultiByteToWideChar
WideCharToMultiByte
GetWindowsDirectoryA
lstrcpynA
lstrcmpiA
LoadLibraryExA
GetLastError
FindResourceA
LoadResource
SizeofResource
GetModuleFileNameA
lstrlenA
InterlockedIncrement
LocalFree
InterlockedDecrement
GetFocus
LoadImageA
KillTimer
DrawTextA
SetFocus
EndPaint
PostMessageA
CharNextA
DestroyWindow
ShowWindow
InvalidateRect
DefWindowProcA
SetWindowTextA
SendMessageA
SetTimer
SetWindowLongA
GetWindowTextA
InsertMenuA
GetWindowLongA
SetWindowPos
GetClientRect
BeginPaint
MoveWindow
RegisterClassExA
LoadCursorA
CreateWindowExA
IsChild
DeleteDC
SetStretchBltMode
GetObjectA
DeleteObject
CreateCompatibleDC
SelectObject
GetStockObject
SetBkColor
CreateSolidBrush
StretchBlt
RegCloseKey
RegDeleteKeyA
RegSetValueExA
RegOpenKeyExA
RegQueryValueExA
RegEnumValueA
RegOpenKeyA
RegCreateKeyExA
RegDeleteValueA
RegEnumKeyExA
RegQueryInfoKeyA
CoTaskMemFree
StringFromGUID2
CLSIDFromString
CoTaskMemAlloc
CoTaskMemRealloc
CoCreateInstance
VariantClear
VarUI4FromStr
VariantInit
VariantCopy
SysAllocString
SysFreeString
VariantChangeType
_TrackMouseEvent
??1type_info@@UAE@XZ
_onexit
__dllonexit
_adjust_fdiv
_initterm
_CxxThrowException
isalpha
isdigit
_purecall
memset
free
realloc
wcslen
malloc
strcpy
srand
rand
_wcsicmp
fclose
strlen
tolower
strstr
time
memcpy
strchr
strncpy
strcat
sprintf
memcmp
__CxxFrameHandler
??2@YAPAXI@Z
fopen
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ