DllCanUnloadNow
DllGetClassObject
DllMain
DllRegisterServer
DllUnregisterServer
SophosDllGetClassObject
Static task
static1
Behavioral task
behavioral1
Sample
2e794f1797ad37cea82fc2f004f75c7e_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2e794f1797ad37cea82fc2f004f75c7e_JaffaCakes118.dll
Resource
win10v2004-20240704-en
Target
2e794f1797ad37cea82fc2f004f75c7e_JaffaCakes118
Size
41KB
MD5
2e794f1797ad37cea82fc2f004f75c7e
SHA1
d5c6faf87b6584978bdf1e69ab7176b4f3c2b34b
SHA256
6d51907d3977de1ebd4cd8158b10bec536a80dd4cb6c685905596fe8984b54f1
SHA512
f4605146333e4b71f60b5c272ba8da19318888ed001374352c5dc0c90a92b345ba0faa64962ec902a773a0c9f6d160b609022b144eddcaa1a37a937ad8708130
SSDEEP
768:PJrRb+Rgc1t6wrvdM+AhtGDdGa0X2g9sODa89EE:xFEz6wrGThtGDdGJ2wsOD5yE
Checks for missing Authenticode signature.
resource |
---|
2e794f1797ad37cea82fc2f004f75c7e_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
ord4481
ord4261
ord3333
ord757
ord3830
ord566
ord764
ord762
ord4353
ord3668
ord578
ord1903
ord1063
ord3553
ord4254
ord2170
ord6044
ord4125
ord4954
ord297
ord1489
ord299
ord2933
ord310
ord1917
ord5152
ord5476
ord3070
ord2036
ord1582
ord980
ord1327
ord5915
ord1620
ord1617
ord3946
ord1402
ord4244
ord1908
ord5073
ord6275
ord4185
ord5212
ord3403
ord4722
ord4280
ord1600
ord5960
ord5235
ord5233
ord923
ord928
ord932
ord930
ord3949
ord2390
ord2410
ord2394
ord2400
ord2398
ord2396
ord2413
ord2408
ord2392
ord2415
ord2403
ord2385
ord2387
ord2405
ord2178
ord2172
ord1521
ord6279
ord3802
ord6277
ord3345
ord4967
ord1362
ord5175
ord1964
ord1656
ord1655
ord1599
ord5200
ord2862
ord4486
ord4272
ord721
ord526
ord4583
ord911
ord784
ord304
ord2644
ord3709
ord3719
ord765
ord315
ord1037
ord1206
ord1208
ord1098
ord371
ord1120
ord1201
ord1175
ord1177
ord1209
ord1092
ord1167
ord581
ord3718
ord2533
ord2646
ord2540
ord2838
ord2714
ord4307
ord2835
ord2731
ord2537
ord5566
ord5213
ord5230
ord4568
ord3948
ord2248
ord5226
ord5224
ord2931
ord1920
ord3832
ord5382
ord6219
ord5102
ord1010
ord3806
ord5583
ord2018
ord2063
ord4326
ord6276
ord3801
ord6278
ord4014
ord4038
ord3683
ord314
ord1084
ord1187
ord934
ord1191
_initterm
??1type_info@@UAE@XZ
_onexit
__dllonexit
memset
_mbsstr
strcpy
free
_mbsnbcmp
malloc
_resetstkoflw
_adjust_fdiv
__CxxFrameHandler
??1exception@@UAE@XZ
??0exception@@QAE@XZ
_purecall
??0exception@@QAE@ABV0@@Z
_CxxThrowException
memmove
wcstombs
strlen
strcat
__CppXcptFilter
__security_error_handler
?terminate@@YAXXZ
_except_handler3
LoadLibraryA
lstrcmpA
LocalFree
DeleteCriticalSection
InitializeCriticalSection
RaiseException
GetModuleHandleA
GetCurrentThreadId
lstrlenA
GetVersion
GetVersionExA
InterlockedExchange
GetLastError
GetProcAddress
CloseHandle
SetEvent
CreateEventA
CreateMutexA
GetModuleFileNameA
ExitProcess
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
FreeLibrary
LocalAlloc
UnhookWindowsHookEx
EnableWindow
LoadIconA
GetWindowRect
BringWindowToTop
SetWindowsHookExA
EnumWindows
IsWindow
SendMessageA
CallNextHookEx
GetClassNameA
CoTaskMemFree
StringFromCLSID
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
DllCanUnloadNow
DllGetClassObject
DllMain
DllRegisterServer
DllUnregisterServer
SophosDllGetClassObject
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ