DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
eb203ebf408152ee9de5fba22f4ba41a_JaffaCakes118.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
eb203ebf408152ee9de5fba22f4ba41a_JaffaCakes118.dll
Resource
win10v2004-20240226-en
Target
eb203ebf408152ee9de5fba22f4ba41a_JaffaCakes118
Size
32KB
MD5
eb203ebf408152ee9de5fba22f4ba41a
SHA1
c07c7ac49d41b24e790967790ea14bfc6eafaedd
SHA256
768eb166d4a5f9893f63265c2f817de0fc2d80bc8a5645589a23899a25d54af4
SHA512
9dce4073e908a76f38b243e2e0e9ab65c035cecc3b7ec02e2533ab4909b19fe9c07a9fe4f4385785143628dd5ecd41fcc323ff2ea7403305002954e68b2dd3b2
SSDEEP
384:fz9CK38W5G6uBBQARQkpNFg+U1gflL9W55VSeE7S:fIrdBBQARQkpNFuKlA5WeK
Checks for missing Authenticode signature.
resource |
---|
eb203ebf408152ee9de5fba22f4ba41a_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IsBadStringPtrA
lstrcatA
WinExec
GetModuleFileNameA
SetEvent
OpenEventA
CreateEventA
TerminateProcess
GetCurrentProcess
CreateThread
LoadLibraryA
InitializeCriticalSection
DeleteCriticalSection
LeaveCriticalSection
InterlockedIncrement
EnterCriticalSection
InterlockedDecrement
lstrlenW
GetModuleHandleA
GlobalAlloc
GlobalLock
GetCurrentProcessId
OpenProcess
ReadProcessMemory
CloseHandle
IsBadReadPtr
VirtualProtect
Sleep
ExitProcess
lstrlenA
GetCurrentDirectoryA
DisableThreadLibraryCalls
KillTimer
GetWindowTextA
SetTimer
GetForegroundWindow
wsprintfA
CallNextHookEx
SetWindowsHookExA
RegCloseKey
RegOpenKeyA
RegSetValueExA
LoadRegTypeLi
SysFreeString
SysStringLen
ord21
ord16
ord15
ord18
ord57
ord32
ord58
ord30
ord23
InternetOpenUrlA
InternetOpenA
InternetCloseHandle
InternetReadFile
fopen
_strlwr
_adjust_fdiv
malloc
_initterm
free
??2@YAPAXI@Z
_purecall
isprint
strstr
memcpy
strrchr
strlen
strcpy
memset
fclose
fread
fputs
_strcmpi
strcat
exit
memcmp
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ