DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
05565622cb2343fa92ae79bf58a7b6df_JaffaCakes118.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
05565622cb2343fa92ae79bf58a7b6df_JaffaCakes118.dll
Resource
win10v2004-20240508-en
Target
05565622cb2343fa92ae79bf58a7b6df_JaffaCakes118
Size
48KB
MD5
05565622cb2343fa92ae79bf58a7b6df
SHA1
bf51d56d97ffeb754c19c5f8c7e5a76708649641
SHA256
961a301dc39bde69795ec14b2027a964105f3a8ed0b5902ccc4e76fa3a3ad8c9
SHA512
341c986c1aa0915a467d25b8a3064244cd7986f75edec86ff2728b0989450455982ccc3cfa0feb16ee77973266c44f0e8f2bf4516651f9439b7ca7114c1d3099
SSDEEP
768:LmBqn0er0d+if5U9lMqSF+pI2YIbOAzEOlm9+xmXo:9b0dOlpIhorAqbxmXo
Checks for missing Authenticode signature.
resource |
---|
05565622cb2343fa92ae79bf58a7b6df_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
gethostname
gethostbyname
ord6283
ord6282
ord823
ord354
ord539
ord4202
ord861
ord465
ord4204
ord798
ord6930
ord1997
ord6407
ord5194
ord533
ord6663
ord5710
ord5683
ord5465
ord541
ord801
ord6467
ord6662
ord4274
ord815
ord6375
ord4486
ord2554
ord2512
ord5731
ord3922
ord1089
ord5199
ord2396
ord3346
ord5300
ord5302
ord4079
ord4698
ord4129
ord5289
ord5714
ord2982
ord3147
ord3259
ord4465
ord3136
ord3262
ord2985
ord3081
ord2976
ord3830
ord3831
ord3825
ord3079
ord4080
ord4622
ord4424
ord3738
ord561
ord3953
ord1116
ord3811
ord2725
ord1131
ord2820
ord1168
ord1577
ord1182
ord342
ord1243
ord1197
ord1570
ord1253
ord1255
ord1578
ord600
ord826
ord269
ord1228
ord389
ord3229
ord5204
ord5807
ord5356
ord2393
ord825
ord922
ord941
ord2818
ord939
ord2614
ord926
ord924
ord2764
ord4278
ord858
ord4277
ord540
ord537
ord535
ord860
ord567
ord1651
ord1768
ord2463
ord1572
ord1601
ord818
ord800
ord1575
ord1176
ord5307
ord3337
_adjust_fdiv
malloc
_initterm
free
atoi
_mbscmp
__CxxFrameHandler
strcpy
memset
sprintf
strncmp
strncpy
strcat
strrchr
_onexit
__dllonexit
??1type_info@@UAE@XZ
?terminate@@YAXXZ
_except_handler3
memcmp
_purecall
memcpy
_mbslwr
_mbsstr
time
srand
rand
rename
WritePrivateProfileStringA
GetModuleHandleA
GetModuleFileNameA
CreateFileA
DeviceIoControl
DeleteFileA
GetVersionExA
InterlockedDecrement
lstrlenW
LocalFree
LocalAlloc
WinExec
GetSystemDirectoryA
GetPrivateProfileStringA
GetTickCount
GetPrivateProfileIntA
CreateThread
InitializeCriticalSection
DeleteCriticalSection
LeaveCriticalSection
CloseHandle
EnterCriticalSection
InterlockedIncrement
SetWindowPos
GetSystemMetrics
CoCreateInstance
SysStringLen
LoadRegTypeLi
SysFreeString
VariantClear
ord58
ord32
ord57
ord18
ord15
ord21
ord16
ord23
ord31
ord30
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ