DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
33aea6811195cfcde8922a2845613cd3_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
33aea6811195cfcde8922a2845613cd3_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
33aea6811195cfcde8922a2845613cd3_JaffaCakes118
Size
44KB
MD5
33aea6811195cfcde8922a2845613cd3
SHA1
5735bb00a2b25b3721441eaa578918ab9ddf7941
SHA256
b977834859daa4239d29726b7528060fd4baaaf8b4e2b115be396c3e8fb175a2
SHA512
e48c5cb04096be1ba2e9479c624a23acf932e9ba1876d5b08b65fecc8556fb1fe57387082441fec99b6b2f3a66c2a444a549afcc03d0a6fd71da23a529c637dd
SSDEEP
768:apkavnUPnnpShoXOhcG+ujHvgGgLa18h4vv:JUKdXOtXjP2LaNH
Checks for missing Authenticode signature.
resource |
---|
33aea6811195cfcde8922a2845613cd3_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetProcAddress
LoadLibraryA
CreateThread
VirtualAlloc
GetModuleFileNameA
WinExec
GetWindowsDirectoryA
GetSystemDirectoryA
CreateProcessA
CreateMutexA
GetLastError
CloseHandle
GetLocalTime
InterlockedIncrement
KillTimer
ShowWindow
CreateWindowExA
DispatchMessageA
SetTimer
SetWindowsHookExA
CallNextHookEx
RegisterClassExA
FindWindowExA
PostMessageA
GetMessageA
UnhookWindowsHookEx
DefWindowProcA
TranslateMessage
RegQueryValueExA
RegOpenKeyExA
RegSetValueExA
RegCreateKeyExA
RegCloseKey
strrchr
_adjust_fdiv
malloc
_initterm
free
strchr
fopen
fwrite
fclose
_stricmp
_except_handler3
__CxxFrameHandler
atoi
??3@YAXPAX@Z
??2@YAPAXI@Z
sprintf
SHGetValueA
HttpQueryInfoA
InternetOpenUrlA
InternetSetOptionA
InternetOpenA
InternetReadFile
InternetCloseHandle
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ