DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
31e08f70d22a95da132ad80121cd952f_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
31e08f70d22a95da132ad80121cd952f_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
31e08f70d22a95da132ad80121cd952f_JaffaCakes118
Size
44KB
MD5
31e08f70d22a95da132ad80121cd952f
SHA1
af8b1ab4441f30b37a1b2e613ebe46e0eed8a42a
SHA256
67704cdb9d1bb45dd72887bd03df2ab44cda9588e5d98860cbdd89190562a150
SHA512
06527614a34012f91b9b8bd9ba7562788649f1adb09eefd875d5b0fb6d452740b11ff4eeefa1d1c981b56b629798f155d6884e1761d41c9f91cddff454eb2f79
SSDEEP
768:tTFsYD6VDA0Mpkav8Ms6YKDQX0jfigLa1a:tTF7D6pA0/PMXDYYfvLa4
Checks for missing Authenticode signature.
resource |
---|
31e08f70d22a95da132ad80121cd952f_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetLastError
CreateMutexA
VirtualAlloc
GetProcAddress
GetWindowsDirectoryA
GetSystemDirectoryA
CreateProcessA
InterlockedIncrement
GetLocalTime
GetModuleFileNameA
LoadLibraryA
CreateThread
CloseHandle
WinExec
GetMessageA
RegisterClassExA
PostMessageA
FindWindowExA
TranslateMessage
UnhookWindowsHookEx
KillTimer
SetTimer
DefWindowProcA
CreateWindowExA
ShowWindow
CallNextHookEx
DispatchMessageA
SetWindowsHookExA
RegQueryValueExA
RegOpenKeyExA
RegSetValueExA
RegCreateKeyExA
RegCloseKey
fclose
_adjust_fdiv
malloc
_initterm
free
strrchr
strchr
fopen
fwrite
_stricmp
_except_handler3
atoi
sprintf
??2@YAPAXI@Z
??3@YAXPAX@Z
__CxxFrameHandler
SHGetValueA
HttpQueryInfoA
InternetOpenUrlA
InternetSetOptionA
InternetOpenA
InternetReadFile
InternetCloseHandle
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ