DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
3392e407d7c666db61c3fc9bc54e53f4_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3392e407d7c666db61c3fc9bc54e53f4_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
3392e407d7c666db61c3fc9bc54e53f4_JaffaCakes118
Size
44KB
MD5
3392e407d7c666db61c3fc9bc54e53f4
SHA1
3b15eb0560a0dea6ad177720515e71a55a3c11fc
SHA256
0774660073cea117be9904759eb50e282ef27c3a1692fa8e2c27607d48412d7f
SHA512
a51d4acc0d612fe4790428625598f5ff67c91d39f3260dd255ab2a012af0d0be669e98dafbf08a856d6eea15a805bc80b80186b503618ff8899ad0323a30db9c
SSDEEP
768:ZmEApkavmF22GWSlqR97fAdfQeMgLa1GFXG4:tzj57fwfNLas/
Checks for missing Authenticode signature.
resource |
---|
3392e407d7c666db61c3fc9bc54e53f4_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
CloseHandle
CreateProcessA
GetSystemDirectoryA
CreateMutexA
GetProcAddress
InterlockedIncrement
CreateThread
VirtualAlloc
WinExec
GetWindowsDirectoryA
GetModuleFileNameA
GetLocalTime
GetLastError
LoadLibraryA
DefWindowProcA
SetTimer
KillTimer
CallNextHookEx
FindWindowExA
CreateWindowExA
ShowWindow
GetMessageA
TranslateMessage
DispatchMessageA
SetWindowsHookExA
UnhookWindowsHookEx
PostMessageA
RegisterClassExA
RegSetValueExA
RegCreateKeyExA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
fclose
_adjust_fdiv
malloc
_initterm
free
_pctype
strchr
fopen
fwrite
_stricmp
_except_handler3
??3@YAXPAX@Z
sprintf
__CxxFrameHandler
strrchr
??2@YAPAXI@Z
SHGetValueA
HttpQueryInfoA
InternetOpenUrlA
InternetSetOptionA
InternetOpenA
InternetReadFile
InternetCloseHandle
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ