DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
180ad8f1024b334c7966180afa953266_JaffaCakes118.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
180ad8f1024b334c7966180afa953266_JaffaCakes118.dll
Resource
win10v2004-20240611-en
Target
180ad8f1024b334c7966180afa953266_JaffaCakes118
Size
28KB
MD5
180ad8f1024b334c7966180afa953266
SHA1
7680011d67a7a7299ade6878255b1f7883a50cd9
SHA256
bf11915a5a5f8e1de827676250505e7f503c0744da757f8290f077d3d5d81655
SHA512
a661e2489775e08fc3a433e722fa014e85517ab87645ea9fa3d72c405b81d05a40dc3c02ed10579e8996e20bd4e22da936b02a846e2ea8c1d88621fbfcc7655e
SSDEEP
192:7h89oTi6J4SaQPlRgspuml9+qQ/1/wzJvZvdW9+2Cp92xR4KyAzeMg/Qq7t/u/N:18EheSaQtRgWl9+qQ/1/ZMyeMm/O
Checks for missing Authenticode signature.
resource |
---|
180ad8f1024b334c7966180afa953266_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
ord860
ord537
ord1176
ord6877
ord5683
ord6467
ord1578
ord600
ord826
ord3181
ord535
ord1980
ord2781
ord4058
ord3178
ord2915
ord2818
ord356
ord2770
ord668
ord540
ord2919
ord5572
ord269
ord4129
ord858
ord800
ord1243
ord924
_adjust_fdiv
??3@YAXPAX@Z
free
fclose
memchr
??1type_info@@UAE@XZ
malloc
memmove
__CxxFrameHandler
sprintf
_initterm
__dllonexit
_onexit
LocalFree
DisableThreadLibraryCalls
OpenMutexA
lstrcpyA
LoadLibraryA
FreeLibrary
GetEnvironmentVariableA
WritePrivateProfileStringA
DeleteFileA
WinExec
GetModuleFileNameA
GetProcAddress
ExitProcess
LocalAlloc
MessageBoxA
wsprintfA
RegOpenKeyExA
RegCloseKey
RegQueryValueExA
RegSetValueExA
??_8?$basic_ofstream@DU?$char_traits@D@std@@@std@@7B@
??0ios_base@std@@IAE@XZ
??_D?$basic_ofstream@DU?$char_traits@D@std@@@std@@QAEXXZ
??1?$basic_ostream@DU?$char_traits@D@std@@@std@@UAE@XZ
??1?$basic_ios@DU?$char_traits@D@std@@@std@@UAE@XZ
??1ios_base@std@@UAE@XZ
??1?$basic_filebuf@DU?$char_traits@D@std@@@std@@UAE@XZ
?write@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV12@PBDH@Z
?_Initcvt@?$basic_filebuf@DU?$char_traits@D@std@@@std@@IAEXXZ
?_Init@?$basic_filebuf@DU?$char_traits@D@std@@@std@@IAEXPAU_iobuf@@W4_Initfl@12@@Z
?__Fiopen@std@@YAPAU_iobuf@@PBDH@Z
?clear@ios_base@std@@QAEXH_N@Z
??_7?$basic_ofstream@DU?$char_traits@D@std@@@std@@6B@
??0?$basic_filebuf@DU?$char_traits@D@std@@@std@@QAE@PAU_iobuf@@@Z
?init@?$basic_ios@DU?$char_traits@D@std@@@std@@IAEXPAV?$basic_streambuf@DU?$char_traits@D@std@@@2@_N@Z
??_7?$basic_ostream@DU?$char_traits@D@std@@@std@@6B@
??_7?$basic_ios@DU?$char_traits@D@std@@@std@@6B@
WSAStartup
gethostbyname
htons
socket
connect
recv
closesocket
WSACleanup
send
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ