DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
39e4b3c799d55adc71b327a8b01ada33_JaffaCakes118.dll
Resource
win7-20240708-en
Target
39e4b3c799d55adc71b327a8b01ada33_JaffaCakes118
Size
17KB
MD5
39e4b3c799d55adc71b327a8b01ada33
SHA1
8fc4e9a14661644fee3190a466186254054e9541
SHA256
04b73355de08451c0e4f0cd7bc2c76b2ec2279fb7c36ceed85582dd685023cb8
SHA512
30165e9c7cd77d81888b8d9a007bd110efe9e4a7d6152457290f439033cd7653de5935a804a55161fa98566f5e92ef256b97eeecdac20077004383c5dbe2034a
SSDEEP
192:Esm2lhoGZ3M5cQemMprCme1Z+Np+57SEFsnWasM+8sSetQ2E1dY9T1+XeLtZH9UY:tm2sK+hM7NNoLKz+jt1wutZ9/FMDGU
Checks for missing Authenticode signature.
resource |
---|
39e4b3c799d55adc71b327a8b01ada33_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
InternetCrackUrlA
recv
wcscmp
ord30
IsWindow
SysAllocStringLen
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE