DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
f348376149caf85b4035bc47c1dc5b48_JaffaCakes118.dll
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
f348376149caf85b4035bc47c1dc5b48_JaffaCakes118.dll
Resource
win10v2004-20240226-en
Target
f348376149caf85b4035bc47c1dc5b48_JaffaCakes118
Size
44KB
MD5
f348376149caf85b4035bc47c1dc5b48
SHA1
7935d7e93f559034b3242bba31d7e5693da4d26f
SHA256
2ff50146006e165f5a0d3d2d54ea9134fad48d8d0e1191c29351b5684c69100e
SHA512
9d9f7d33ce740dcaded13a06e856b31671520627791145d0c6aaa63aaf1998831a12bbfba7bb01cdfbc48f5463770917f508e8272c34c81439cc2cdf0f85eb14
SSDEEP
768:9RczOzf6wN5MQaQzVyXidI/3KxWP4EmDmW:TcIBf4SdI/KUGD
Checks for missing Authenticode signature.
resource |
---|
f348376149caf85b4035bc47c1dc5b48_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
ioctlsocket
WSAStartup
socket
htons
connect
send
gethostbyname
closesocket
recv
LocalFree
CreateThread
IsBadStringPtrA
LoadLibraryA
Sleep
GetProcAddress
GetLastError
GetSystemInfo
IsBadReadPtr
VirtualQuery
WideCharToMultiByte
GetModuleHandleA
GetTickCount
InterlockedDecrement
CloseHandle
CreateFileA
lstrcpynA
MapViewOfFile
CreateFileMappingA
OpenFileMappingA
wsprintfA
FindWindowA
GetWindowTextA
GetParent
ScreenToClient
GetClassNameA
CallNextHookEx
CoInitializeEx
OleRun
CoCreateInstance
SysFreeString
SysAllocString
VariantClear
GetErrorInfo
_initterm
_adjust_fdiv
_strupr
_strdup
_CxxThrowException
??1type_info@@UAE@XZ
_onexit
__dllonexit
strchr
atoi
free
isalpha
isdigit
realloc
malloc
wcslen
??2@YAPAXI@Z
__CxxFrameHandler
sprintf
??3@YAXPAX@Z
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ