DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
0843283802301f57bbe064d25bf218dd_JaffaCakes118.dll
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
0843283802301f57bbe064d25bf218dd_JaffaCakes118.dll
Resource
win10v2004-20240226-en
Target
0843283802301f57bbe064d25bf218dd_JaffaCakes118
Size
44KB
MD5
0843283802301f57bbe064d25bf218dd
SHA1
8664fa00d5ad7a62dc9038f85207ab7ffa532dd5
SHA256
cbd1203e9d7244eb3705c1261f9f9c539746167414acadcecb339edc8d69d854
SHA512
fecbdec02a077230f88e15275b06c84e9d5cba1ffc5d1476060c612732acdbc43208c12bac5bf5797bc6aab98a14b86c20382e19bc463f8117d0faf7449d993e
SSDEEP
768:VpkavGxm6PPsv8b9OUKBqCSR27l1gLa1:ck8b9pKBEyiLa
Checks for missing Authenticode signature.
resource |
---|
0843283802301f57bbe064d25bf218dd_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetLastError
WinExec
GetWindowsDirectoryA
GetSystemDirectoryA
CreateProcessA
GetProcAddress
LoadLibraryA
CreateThread
VirtualAlloc
InterlockedIncrement
GetModuleFileNameA
GetLocalTime
CloseHandle
CreateMutexA
DispatchMessageA
TranslateMessage
GetMessageA
ShowWindow
FindWindowExA
RegisterClassExA
KillTimer
SetTimer
DefWindowProcA
CallNextHookEx
UnhookWindowsHookEx
SetWindowsHookExA
PostMessageA
CreateWindowExA
RegSetValueExA
RegCreateKeyExA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
fclose
_adjust_fdiv
malloc
_initterm
free
_except_handler3
strchr
fopen
fwrite
_stricmp
strrchr
_pctype
sprintf
__CxxFrameHandler
??2@YAPAXI@Z
??3@YAXPAX@Z
SHGetValueA
HttpQueryInfoA
InternetOpenUrlA
InternetSetOptionA
InternetOpenA
InternetReadFile
InternetCloseHandle
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ