DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
2ba1d0c6fd1bcde72c21508eb720321b_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2ba1d0c6fd1bcde72c21508eb720321b_JaffaCakes118.dll
Resource
win10v2004-20240704-en
Target
2ba1d0c6fd1bcde72c21508eb720321b_JaffaCakes118
Size
44KB
MD5
2ba1d0c6fd1bcde72c21508eb720321b
SHA1
cf25bc2c17863351f0391930306d5f42402e288c
SHA256
629411c984fe602cbe91db630565f4945b33565e6435269808b709094095fb93
SHA512
a95dca08ea909a242060bde76cabb075dbc47750559d9b8ac05546440f2a704659aa735ee77c15506d3d6be5559c241a83497d8617d99acbfa9e250403e3c7d0
SSDEEP
768:tTwxetZukpkav6YFKiIQB/y0YcogLa1Is:0etZuXlYFKWioLa
Checks for missing Authenticode signature.
resource |
---|
2ba1d0c6fd1bcde72c21508eb720321b_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
WinExec
GetWindowsDirectoryA
GetSystemDirectoryA
GetProcAddress
GetLocalTime
CreateMutexA
InterlockedIncrement
CreateProcessA
VirtualAlloc
GetModuleFileNameA
LoadLibraryA
CreateThread
CloseHandle
GetLastError
ShowWindow
CreateWindowExA
SetWindowsHookExA
RegisterClassExA
FindWindowExA
SetTimer
GetMessageA
TranslateMessage
DispatchMessageA
CallNextHookEx
UnhookWindowsHookEx
KillTimer
PostMessageA
DefWindowProcA
RegQueryValueExA
RegOpenKeyExA
RegSetValueExA
RegCreateKeyExA
RegCloseKey
??3@YAXPAX@Z
_adjust_fdiv
malloc
_initterm
free
strrchr
atoi
__CxxFrameHandler
??2@YAPAXI@Z
_stricmp
strchr
sprintf
_except_handler3
fclose
fwrite
fopen
InternetSetOptionA
InternetOpenA
InternetReadFile
InternetCloseHandle
InternetOpenUrlA
HttpQueryInfoA
SHGetValueA
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ