DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
f584378d7ab0d71a4710730e7cd3e97e_JaffaCakes118.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f584378d7ab0d71a4710730e7cd3e97e_JaffaCakes118.dll
Resource
win10v2004-20240412-en
Target
f584378d7ab0d71a4710730e7cd3e97e_JaffaCakes118
Size
44KB
MD5
f584378d7ab0d71a4710730e7cd3e97e
SHA1
9700e3afedeb2d73850ea62ffb072254f307f59a
SHA256
4a9296e22fe1b2fd4c7a60ed7a830fffcb7d9fc8cd7481fa4d830a805b4191b5
SHA512
804d0169289c05f3ee3720e70e74d2c2b9edee89b2478863957795320c51fd91d5ed17db5205aebef32d7e5978d35a3f708983e7fda744194ba8229dc46ab2d0
SSDEEP
768:tnZDd4Y4Gmpkav/ZaDfzUvBUhtzgLa1O5:tZF/bTCuXsLaa
Checks for missing Authenticode signature.
resource |
---|
f584378d7ab0d71a4710730e7cd3e97e_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
VirtualAlloc
GetProcAddress
LoadLibraryA
WinExec
GetWindowsDirectoryA
CreateThread
GetModuleFileNameA
InterlockedIncrement
GetLocalTime
CreateProcessA
CreateMutexA
GetLastError
CloseHandle
GetSystemDirectoryA
RegisterClassExA
CallNextHookEx
DispatchMessageA
TranslateMessage
GetMessageA
SetWindowsHookExA
KillTimer
SetTimer
DefWindowProcA
CreateWindowExA
ShowWindow
UnhookWindowsHookEx
FindWindowExA
PostMessageA
RegSetValueExA
RegCreateKeyExA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
SHGetValueA
fwrite
_adjust_fdiv
malloc
_initterm
free
atoi
strrchr
??2@YAPAXI@Z
??3@YAXPAX@Z
strchr
fopen
_stricmp
fclose
_except_handler3
sprintf
__CxxFrameHandler
HttpQueryInfoA
InternetOpenUrlA
InternetSetOptionA
InternetOpenA
InternetReadFile
InternetCloseHandle
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ