DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
183b44a20bea2a668a49fc957ddefc52_JaffaCakes118.dll
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
183b44a20bea2a668a49fc957ddefc52_JaffaCakes118.dll
Resource
win10v2004-20240508-en
Target
183b44a20bea2a668a49fc957ddefc52_JaffaCakes118
Size
44KB
MD5
183b44a20bea2a668a49fc957ddefc52
SHA1
a57491f54369d52401f8d83158a4335236b3648a
SHA256
64d2a60965716cd1cbb4a0109acc7aa8eb779e23e1fc1279713c3ca9344567e2
SHA512
e5ebf829664a591e7dbd96989d2ab2c58e047addea52da2e340d1df83de93711650750ebdd781c527eef106b4a570230991f5bbce3ba7efd9fd44df8feec56ea
SSDEEP
768:GOsSTVimetB2WNJ3CRpkavO47iSFZjQ9gLa1D:TT5et1N78OW/La9
Checks for missing Authenticode signature.
resource |
---|
183b44a20bea2a668a49fc957ddefc52_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
CreateProcessA
GetProcAddress
LoadLibraryA
GetLocalTime
CreateThread
CloseHandle
GetLastError
CreateMutexA
VirtualAlloc
InterlockedIncrement
GetModuleFileNameA
GetSystemDirectoryA
GetWindowsDirectoryA
WinExec
RegisterClassExA
DefWindowProcA
SetTimer
KillTimer
SetWindowsHookExA
TranslateMessage
DispatchMessageA
FindWindowExA
PostMessageA
CallNextHookEx
CreateWindowExA
GetMessageA
UnhookWindowsHookEx
ShowWindow
RegQueryValueExA
RegOpenKeyExA
RegSetValueExA
RegCreateKeyExA
RegCloseKey
??2@YAPAXI@Z
_adjust_fdiv
malloc
_initterm
free
_except_handler3
atoi
strrchr
__CxxFrameHandler
_stricmp
??3@YAXPAX@Z
strchr
fclose
fwrite
fopen
sprintf
InternetSetOptionA
InternetOpenA
InternetReadFile
InternetCloseHandle
InternetOpenUrlA
HttpQueryInfoA
SHGetValueA
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ