DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
2511e68b4659b18ee17509512046de8a_JaffaCakes118.dll
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
2511e68b4659b18ee17509512046de8a_JaffaCakes118.dll
Resource
win10v2004-20240508-en
Target
2511e68b4659b18ee17509512046de8a_JaffaCakes118
Size
48KB
MD5
2511e68b4659b18ee17509512046de8a
SHA1
738d8e5502db5b8b83ec1a876d43feb91a6388be
SHA256
634cb21921191d98130efe65578f6e7b9a154402c75dfedf4ed641424c9bf71f
SHA512
caafe630ff6cd718b72777a2aa96c0f42c9340636614a26b5d603791366979669b174452c700bb936c0cf830bcc7c076fdccd0bd7997934ea959d1a81af5463b
SSDEEP
768:lQSGxvX2PbKq0UotCcSHoqMl77+YbvNgwTUEhpvZSCWbFZ0As:luX2PbKqVoquFpgwTUEhNyFr
Checks for missing Authenticode signature.
resource |
---|
2511e68b4659b18ee17509512046de8a_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetLastError
CreateEventA
MoveFileA
DeleteFileA
SetFileAttributesA
MultiByteToWideChar
FindNextFileA
FindFirstFileA
GetSystemDirectoryA
Process32Next
Process32First
CreateThread
Sleep
WideCharToMultiByte
lstrlenW
InterlockedIncrement
GetWindowsDirectoryA
FreeLibrary
LeaveCriticalSection
EnterCriticalSection
DisableThreadLibraryCalls
InitializeCriticalSection
DeleteCriticalSection
InterlockedDecrement
HeapAlloc
GetSystemInfo
GetVersionExA
HeapCreate
HeapDestroy
GetShortPathNameA
GetModuleHandleA
GetModuleFileNameA
WritePrivateProfileStringA
CloseHandle
GetLocalTime
LoadLibraryA
GetProcAddress
GetCommandLineW
lstrlenA
GetCurrentProcessId
DefWindowProcA
CreateWindowExA
ShowWindow
SetWindowTextA
SendMessageA
RegisterClassExA
IsWindow
FindWindowExA
TranslateMessage
DispatchMessageA
CallNextHookEx
KillTimer
SetTimer
PostMessageA
GetMessageA
RegQueryValueExA
RegOpenKeyExA
RegSetValueExA
RegCreateKeyExA
RegCloseKey
CommandLineToArgvW
CoInitialize
CoCreateInstance
SysStringLen
LoadRegTypeLi
SysAllocString
VariantClear
SysFreeString
_strlwr
_purecall
rand
memcpy
strchr
fopen
fwrite
free
_initterm
malloc
_adjust_fdiv
_stricmp
memcmp
fclose
strcmp
memset
??2@YAPAXI@Z
strrchr
strcat
sprintf
strcpy
_access
strstr
strlen
??3@YAXPAX@Z
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ