DllGetClassObject
DllRegisterServer
PluginInit
Behavioral task
behavioral1
Sample
f01d3419a4c2a7e3aab1e392c4c415d4_JaffaCakes118.dll
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
f01d3419a4c2a7e3aab1e392c4c415d4_JaffaCakes118.dll
Resource
win10v2004-20240412-en
Target
f01d3419a4c2a7e3aab1e392c4c415d4_JaffaCakes118
Size
36KB
MD5
f01d3419a4c2a7e3aab1e392c4c415d4
SHA1
44cd7bd3d51f32419a807b510f73beadfe1340a8
SHA256
b382d0e1a2144d519e9dfff537474d314b68872665a3c773a56a14e1b2ea271f
SHA512
0e0e6b26c7bb31a58696180c6075f15f557ba87664bc7c20d6fe0fdef0bbbb95ce089f8cd3dd2c1b1b321ee8413e61055e5ff40a4f4369d7b3eb01364f80207b
SSDEEP
192:mfb+RrL+/gKTPY3S6/l8mOaxbdToAGImkeZOizZEcF9r:mfb+Rr6/gKbkS6//OO/mkeZhz1Fl
icedid
3183125126
tiplifid.top
Checks for missing Authenticode signature.
Processes:
resource |
---|
f01d3419a4c2a7e3aab1e392c4c415d4_JaffaCakes118 |
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
wsprintfW
wsprintfA
GetUserNameA
LookupAccountNameW
VirtualProtect
GetComputerNameExA
GetTempPathA
Sleep
ExitProcess
CreateThread
CreateFileA
WriteFile
CloseHandle
HeapAlloc
HeapReAlloc
HeapFree
GetProcessHeap
GetLastError
SwitchToThread
GetTickCount64
GetComputerNameExW
GetProcAddress
LoadLibraryA
CreateDirectoryA
VirtualAlloc
lstrcpyA
lstrcatA
WinHttpCloseHandle
WinHttpConnect
WinHttpReadData
WinHttpQueryDataAvailable
WinHttpSetOption
WinHttpOpenRequest
WinHttpSendRequest
WinHttpReceiveResponse
WinHttpQueryHeaders
WinHttpQueryOption
WinHttpOpen
WinHttpSetStatusCallback
SHGetFolderPathA
memset
DllGetClassObject
DllRegisterServer
PluginInit
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE