BCenLUJ
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
245625d929c3f7af007767771fd86585_JaffaCakes118.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
245625d929c3f7af007767771fd86585_JaffaCakes118.dll
Resource
win10v2004-20240611-en
Target
245625d929c3f7af007767771fd86585_JaffaCakes118
Size
44KB
MD5
245625d929c3f7af007767771fd86585
SHA1
987e142d505e97d8389625bafb14190c2165a3f9
SHA256
0d2ec7f9b9d2f085863ca8c192d6fc21e50dd6ff83d1461344e2fbd334b2332f
SHA512
b03cc72d30a22abc7d0503095ecb907eae5e954f0fa42b8c497aaa7c8d17c479a4388ab6bc932a9304bf46634f49aef34f22e4a82dcf1b1eda684e1c257a41c7
SSDEEP
768:GpkavQJurBeDJLnEqpWPnv9GFKagLa1YG:1wteD2dP1GwHLaT
Checks for missing Authenticode signature.
resource |
---|
245625d929c3f7af007767771fd86585_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetCommandLineA
FreeLibrary
WinExec
GetWindowsDirectoryA
GetSystemDirectoryA
GetLocalTime
CreateThread
GetModuleHandleA
GetProcAddress
LoadLibraryA
GetModuleFileNameA
InterlockedIncrement
CreateProcessA
CloseHandle
CreateMutexA
GetLastError
VirtualAlloc
UnhookWindowsHookEx
CallNextHookEx
KillTimer
SetTimer
CreateWindowExA
ShowWindow
RegisterClassExA
GetMessageA
TranslateMessage
DispatchMessageA
FindWindowExA
PostMessageA
DefWindowProcA
SetWindowsHookExA
RegSetValueExA
RegCreateKeyExA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
free
strrchr
_except_handler3
??2@YAPAXI@Z
??3@YAXPAX@Z
strchr
fopen
_stricmp
fwrite
_initterm
malloc
_adjust_fdiv
isupper
isspace
ispunct
isprint
islower
isgraph
isdigit
sprintf
__CxxFrameHandler
fclose
BCenLUJ
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ