DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
15106bd6922727f2b3efba04f3714b55_JaffaCakes118.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
15106bd6922727f2b3efba04f3714b55_JaffaCakes118.dll
Resource
win10v2004-20240611-en
Target
15106bd6922727f2b3efba04f3714b55_JaffaCakes118
Size
44KB
MD5
15106bd6922727f2b3efba04f3714b55
SHA1
d5f90b62a52e9bb468e363d0a3543883afc74d79
SHA256
c89f6b70148f81ba60701538e1132e3b4fcb3aaa8cdf1f4c3cb6df07ee70b9d2
SHA512
1154b4429e293fc5dd9634bbb3070b4c2582e45f6f18ebe13cc319a88cd358c2c0c14e3c3056082b8c1b8069802226c08de3c29437f5e4485fb4c079a1d906ce
SSDEEP
768:JrApdB/kQSrvUHCUjrbEpkavOjb9/dkjmwgLa1/:R+B/s4rDF39lYmLa
Checks for missing Authenticode signature.
resource |
---|
15106bd6922727f2b3efba04f3714b55_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
CloseHandle
CreateMutexA
CreateProcessA
GetModuleFileNameA
CreateThread
GetLastError
GetProcAddress
LoadLibraryA
InterlockedIncrement
GetLocalTime
GetSystemDirectoryA
GetWindowsDirectoryA
WinExec
VirtualAlloc
RegisterClassExA
UnhookWindowsHookEx
DispatchMessageA
TranslateMessage
FindWindowExA
SetWindowsHookExA
KillTimer
SetTimer
CreateWindowExA
ShowWindow
DefWindowProcA
CallNextHookEx
PostMessageA
GetMessageA
RegSetValueExA
RegCreateKeyExA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
??2@YAPAXI@Z
_adjust_fdiv
malloc
_initterm
free
_pctype
strrchr
_except_handler3
__CxxFrameHandler
_stricmp
??3@YAXPAX@Z
strchr
fclose
fwrite
fopen
sprintf
SHGetValueA
HttpQueryInfoA
InternetOpenUrlA
InternetSetOptionA
InternetOpenA
InternetReadFile
InternetCloseHandle
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ