DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
19d0efd534e5413c4df38865f8d590ff_JaffaCakes118.dll
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
19d0efd534e5413c4df38865f8d590ff_JaffaCakes118.dll
Resource
win10v2004-20240611-en
Target
19d0efd534e5413c4df38865f8d590ff_JaffaCakes118
Size
44KB
MD5
19d0efd534e5413c4df38865f8d590ff
SHA1
844d265c1b59cdf8ef12c6b283427a54a0a8ac08
SHA256
3ced367004103144603fe61b8415dd9c3b9e9e77d1c918722586fad470822467
SHA512
a7cdc28007104a256888db75e5321ce457840b61546798210df1a48479398cc00802229bc2fef6401c1311aec93c626b2d7871756dfa56c3efa650848f471692
SSDEEP
768:XM3BQwOx67Lg7wRYtpkavb9QtEgLa1rG:XMxexqMwt4m3Lah
Checks for missing Authenticode signature.
resource |
---|
19d0efd534e5413c4df38865f8d590ff_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetLastError
InterlockedIncrement
CreateMutexA
GetProcAddress
GetWindowsDirectoryA
GetSystemDirectoryA
GetLocalTime
CreateProcessA
VirtualAlloc
GetModuleFileNameA
LoadLibraryA
CreateThread
CloseHandle
WinExec
ShowWindow
CreateWindowExA
CallNextHookEx
PostMessageA
FindWindowExA
UnhookWindowsHookEx
KillTimer
SetTimer
DefWindowProcA
SetWindowsHookExA
RegisterClassExA
GetMessageA
TranslateMessage
DispatchMessageA
RegSetValueExA
RegCreateKeyExA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
SHGetValueA
strrchr
_adjust_fdiv
malloc
_initterm
free
atoi
__CxxFrameHandler
strchr
fopen
fwrite
fclose
_stricmp
??2@YAPAXI@Z
??3@YAXPAX@Z
_except_handler3
sprintf
HttpQueryInfoA
InternetOpenUrlA
InternetSetOptionA
InternetOpenA
InternetReadFile
InternetCloseHandle
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ