DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
3ca30fcab26e06c5865ad7a4d6e31c2f_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3ca30fcab26e06c5865ad7a4d6e31c2f_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
3ca30fcab26e06c5865ad7a4d6e31c2f_JaffaCakes118
Size
44KB
MD5
3ca30fcab26e06c5865ad7a4d6e31c2f
SHA1
8502a2b959afd7284d3fb6378c3d9f0a5f8f5e95
SHA256
20e35ab8b908de9dc1fb7475650d68b3bcd9e100c127c7a8641248e6d7d79bdb
SHA512
c0265a615a48393134b38108d181cc0f33dec1a97d22f5fbfae0fbe477f45163b95cdf8fda6b34598c273fe1104e2918f83d5a205f0f8565be232b9d1dc833f6
SSDEEP
768:mqF4ZMjpkavSc1OIhNyMSTU1nZGQSgqgLa1F:mFMmo1OIKI1nZGJCLa7
Checks for missing Authenticode signature.
resource |
---|
3ca30fcab26e06c5865ad7a4d6e31c2f_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetProcAddress
LoadLibraryA
CreateProcessA
GetModuleFileNameA
GetSystemDirectoryA
GetLocalTime
VirtualAlloc
WinExec
GetWindowsDirectoryA
InterlockedIncrement
CreateMutexA
GetLastError
CloseHandle
CreateThread
TranslateMessage
GetMessageA
DefWindowProcA
SetTimer
DispatchMessageA
UnhookWindowsHookEx
FindWindowExA
PostMessageA
RegisterClassExA
CreateWindowExA
ShowWindow
CallNextHookEx
SetWindowsHookExA
KillTimer
RegQueryValueExA
RegOpenKeyExA
RegSetValueExA
RegCreateKeyExA
RegCloseKey
fwrite
_adjust_fdiv
malloc
_initterm
free
strrchr
__CxxFrameHandler
strchr
fopen
_stricmp
fclose
_except_handler3
atoi
??3@YAXPAX@Z
??2@YAPAXI@Z
sprintf
SHGetValueA
HttpQueryInfoA
InternetOpenUrlA
InternetSetOptionA
InternetOpenA
InternetReadFile
InternetCloseHandle
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ