DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
5b4a7e6d8ac3da6a39a85fa068ad60e2_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
5b4a7e6d8ac3da6a39a85fa068ad60e2_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
5b4a7e6d8ac3da6a39a85fa068ad60e2_JaffaCakes118
Size
44KB
MD5
5b4a7e6d8ac3da6a39a85fa068ad60e2
SHA1
a625a59bb7b7d602f036afff7631f091b847d2e5
SHA256
51f0cc3dbe923b76c847fc2cf5b71e521158ba28bd65d28e0703836d0dbcc478
SHA512
e6a1c3d1a22e75de83cab38f7ac139f8c5932ba6e613fa0917ae080adf560f379517438ed16d029e0ff212fefd40f17552b9786a0459c4a721a5cc5000523e75
SSDEEP
768:AT8pkavU456fx0Jv7X/43dMDbDp8SgLa1g:ATP2oYvbA3dMD3mfLaS
Checks for missing Authenticode signature.
resource |
---|
5b4a7e6d8ac3da6a39a85fa068ad60e2_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetSystemDirectoryA
WinExec
GetWindowsDirectoryA
GetLastError
CreateMutexA
CreateProcessA
VirtualAlloc
GetLocalTime
InterlockedIncrement
GetModuleFileNameA
CreateThread
LoadLibraryA
GetProcAddress
CloseHandle
TranslateMessage
GetMessageA
PostMessageA
FindWindowExA
DispatchMessageA
UnhookWindowsHookEx
SetWindowsHookExA
CreateWindowExA
ShowWindow
KillTimer
SetTimer
CallNextHookEx
RegisterClassExA
DefWindowProcA
RegSetValueExA
RegCreateKeyExA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
fopen
_adjust_fdiv
malloc
_initterm
free
strrchr
atoi
_except_handler3
strchr
_stricmp
fwrite
fclose
sprintf
__CxxFrameHandler
??3@YAXPAX@Z
??2@YAPAXI@Z
SHGetValueA
HttpQueryInfoA
InternetOpenUrlA
InternetSetOptionA
InternetOpenA
InternetReadFile
InternetCloseHandle
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ