DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
3a8361e870f2d2f027b58b9d61e15c83_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
3a8361e870f2d2f027b58b9d61e15c83_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
3a8361e870f2d2f027b58b9d61e15c83_JaffaCakes118
Size
68KB
MD5
3a8361e870f2d2f027b58b9d61e15c83
SHA1
4ec446f95dd3910028ad878d6cdfd09d936a9f39
SHA256
8f27340be131c44f359b5f1f1a96bbf95eafaf9807a62ab194940be1b791111d
SHA512
21bda8dc1ddb90def9078068bffef51c7fc0c020e70cb93d8df3aa5d5793a59f71228747e2bb0f702750ad48bda87423f563f47bee49c69d2a65df3e8175f48d
SSDEEP
384:q3wJ4yfLlhz8f0Pba3YYLM7OfJTdgTSWf6Mqk+4feomBRn/L0Mbyrc6twF02ngyR:q3Q5hABYo35guWBfxmB1L9+rV
Checks for missing Authenticode signature.
resource |
---|
3a8361e870f2d2f027b58b9d61e15c83_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
FindClose
FindFirstFileA
GetModuleHandleA
GetModuleFileNameA
WinExec
Sleep
SetEvent
OpenEventA
CreateThread
CreateEventA
TerminateProcess
GetCurrentProcess
DisableThreadLibraryCalls
InitializeCriticalSection
DeleteCriticalSection
LeaveCriticalSection
InterlockedIncrement
EnterCriticalSection
InterlockedDecrement
IsBadReadPtr
GetCurrentDirectoryA
LoadLibraryA
GetProcAddress
GetCurrentProcessId
CloseHandle
VirtualAlloc
VirtualProtect
Module32First
Module32Next
lstrlenW
lstrlenA
MultiByteToWideChar
WideCharToMultiByte
ReadProcessMemory
OpenProcess
VirtualProtectEx
WriteProcessMemory
CreateToolhelp32Snapshot
wsprintfA
EnumWindows
GetWindowThreadProcessId
SetTimer
KillTimer
CallNextHookEx
SetWindowsHookExA
RegOpenKeyA
RegSetValueExA
RegCloseKey
SysFreeString
LoadRegTypeLi
SysStringLen
isprint
sprintf
_purecall
memcpy
strcat
strrchr
__CxxFrameHandler
??2@YAPAXI@Z
_except_handler3
?terminate@@YAXXZ
free
_initterm
malloc
_adjust_fdiv
_strcmpi
strcpy
strcmp
??3@YAXPAX@Z
memset
strlen
memcmp
_itoa
ord21
ord16
ord15
ord18
ord57
ord32
ord58
ord30
ord23
StrStrIA
InternetCloseHandle
InternetOpenUrlA
InternetOpenA
InternetReadFile
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ