DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
2a4948888b43494eae5b749a625efca5_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2a4948888b43494eae5b749a625efca5_JaffaCakes118.dll
Resource
win10v2004-20240704-en
Target
2a4948888b43494eae5b749a625efca5_JaffaCakes118
Size
44KB
MD5
2a4948888b43494eae5b749a625efca5
SHA1
c094a825102e1b438e01d4c11378213dcf02a951
SHA256
4cccf3d597217441bf5ab5826d61f46793439677d824b29351455662e4bc01fe
SHA512
00b02f073056a23bbfe0153c165d875f51510724fb3d940d01fbbbd8e9610b62b7ccf9b1fb22b09f06daf865050a244fc949717821c1f5c62f8c07c8ed7ced7c
SSDEEP
768:RdGU3At8CMfma/ow0pkavh0fOi3gLa1j:rGU3ZBHkAPwLap
Checks for missing Authenticode signature.
resource |
---|
2a4948888b43494eae5b749a625efca5_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetModuleFileNameA
InterlockedIncrement
GetLastError
GetSystemDirectoryA
CreateMutexA
CreateProcessA
CreateThread
VirtualAlloc
GetWindowsDirectoryA
WinExec
LoadLibraryA
GetProcAddress
CloseHandle
GetLocalTime
GetMessageA
PostMessageA
FindWindowExA
CallNextHookEx
TranslateMessage
UnhookWindowsHookEx
RegisterClassExA
KillTimer
SetTimer
DefWindowProcA
CreateWindowExA
SetWindowsHookExA
DispatchMessageA
ShowWindow
RegSetValueExA
RegCreateKeyExA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
strchr
_adjust_fdiv
malloc
_initterm
free
_except_handler3
_pctype
__CxxFrameHandler
strrchr
_stricmp
fopen
fwrite
sprintf
??3@YAXPAX@Z
??2@YAPAXI@Z
fclose
SHGetValueA
HttpQueryInfoA
InternetOpenUrlA
InternetSetOptionA
InternetOpenA
InternetReadFile
InternetCloseHandle
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ