DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
2b5f9cfaf67443ae610b0c2a2387cd26_JaffaCakes118.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
2b5f9cfaf67443ae610b0c2a2387cd26_JaffaCakes118.dll
Resource
win10v2004-20240508-en
Target
2b5f9cfaf67443ae610b0c2a2387cd26_JaffaCakes118
Size
52KB
MD5
2b5f9cfaf67443ae610b0c2a2387cd26
SHA1
e3ff57231e732af8be7e8cb0a43193c1621157f6
SHA256
12195400220da016710179256f3fee975f19eb7cbbc828e2c808a52064d5be46
SHA512
bab3e9ddae16f52a40f3d797e08011358b4bb32209aa55afe753b4e0323c8656271ebe457520e13efc8c2e5222f7e795cd58c6cb874268ffcfb35d1cce07715b
SSDEEP
384:n5XxpmqB4Qqxdw0iuLPjHk0Pba3TlzaNz/AzliVkZeOuNp7:n5Xx0qD10iyjHuZzaNz/ALwOuN
Checks for missing Authenticode signature.
resource |
---|
2b5f9cfaf67443ae610b0c2a2387cd26_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
CreateToolhelp32Snapshot
WriteProcessMemory
VirtualProtectEx
OpenProcess
lstrlenA
Module32Next
Module32First
VirtualAlloc
WritePrivateProfileStringA
IsBadStringPtrA
GetCurrentDirectoryA
GetPrivateProfileStringA
GetTempPathA
WinExec
GetCurrentProcessId
lstrlenW
InterlockedDecrement
EnterCriticalSection
InterlockedIncrement
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
LoadLibraryA
VirtualProtect
DisableThreadLibraryCalls
GetCurrentProcess
TerminateProcess
CreateEventA
CreateThread
OpenEventA
SetEvent
CloseHandle
Sleep
GetModuleFileNameA
GetWindowThreadProcessId
wsprintfA
SetWindowsHookExA
CallNextHookEx
EnumWindows
RegCloseKey
RegOpenKeyA
RegSetValueExA
LoadRegTypeLi
SysFreeString
SysStringLen
??3@YAXPAX@Z
_purecall
memcmp
isprint
sprintf
free
??2@YAPAXI@Z
malloc
_adjust_fdiv
strlen
_strcmpi
memcpy
strcat
strcmp
strrchr
strcpy
_initterm
memset
_itoa
ord15
ord16
ord21
ord18
ord57
ord32
ord58
ord30
ord23
StrStrIA
InternetOpenUrlA
InternetOpenA
InternetReadFile
InternetCloseHandle
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ