DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
f5ef242bf51eb2139898d8ba7b065629_JaffaCakes118.dll
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
f5ef242bf51eb2139898d8ba7b065629_JaffaCakes118.dll
Resource
win10v2004-20240412-en
Target
f5ef242bf51eb2139898d8ba7b065629_JaffaCakes118
Size
44KB
MD5
f5ef242bf51eb2139898d8ba7b065629
SHA1
bff6a4be4fe3b0d179159f55aa57c05b82a4274b
SHA256
635cff9a00caf949ce15268fb08a8dd17087b22d92be4be469705950dab8178c
SHA512
3a34b41c2f4c7be26797d2e7762e1c8d5b85e41333502e4e140461a4ebe44b0c1e4f22a9d8d0fbf28cbf75e9a5d58c46ae7f89ae798ed63e27d295dea9c052f6
SSDEEP
768:1tKfoPHQC6n/EpkavAs1rZBYqght+gLa1ry:7zCOrZeBPLa
Checks for missing Authenticode signature.
resource |
---|
f5ef242bf51eb2139898d8ba7b065629_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
CreateThread
VirtualAlloc
GetProcAddress
LoadLibraryA
CreateProcessA
InterlockedIncrement
WinExec
GetWindowsDirectoryA
GetModuleFileNameA
CreateMutexA
GetLastError
CloseHandle
GetLocalTime
GetSystemDirectoryA
CallNextHookEx
ShowWindow
CreateWindowExA
PostMessageA
FindWindowExA
DispatchMessageA
SetWindowsHookExA
RegisterClassExA
UnhookWindowsHookEx
KillTimer
SetTimer
DefWindowProcA
GetMessageA
TranslateMessage
RegQueryValueExA
RegOpenKeyExA
RegSetValueExA
RegCreateKeyExA
RegCloseKey
SHGetValueA
__CxxFrameHandler
_adjust_fdiv
malloc
_initterm
free
strchr
fopen
fwrite
fclose
_except_handler3
strrchr
_stricmp
sprintf
??2@YAPAXI@Z
_pctype
??3@YAXPAX@Z
HttpQueryInfoA
InternetOpenUrlA
InternetSetOptionA
InternetOpenA
InternetReadFile
InternetCloseHandle
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ