DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
601c057a091f5848634a08449de2d23b_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
601c057a091f5848634a08449de2d23b_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
601c057a091f5848634a08449de2d23b_JaffaCakes118
Size
44KB
MD5
601c057a091f5848634a08449de2d23b
SHA1
71a491f9895fbb72ac3ab963ce61c2a439672e32
SHA256
e794e658932f616f0e8b2fbb3e8a16a4c1d708a4a0d429ae10949ed9c056393f
SHA512
f444da91f96021a1b18a1802d977fc00ea500f3e9906dfae9946c4a0a62334122ebdb1ed6682750c49968748ee8b76d82c52480dd0b2fd205cff3c2ec28619d8
SSDEEP
768:trDmbfpkavtox5gav6lsRnQ5Uq4/f3mvqwLNP014gLa1+3:tPmmdsufjCw5La
Checks for missing Authenticode signature.
resource |
---|
601c057a091f5848634a08449de2d23b_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetLastError
CreateProcessA
GetSystemDirectoryA
GetModuleFileNameA
WinExec
GetWindowsDirectoryA
CreateMutexA
InterlockedIncrement
VirtualAlloc
CreateThread
CloseHandle
LoadLibraryA
GetProcAddress
GetLocalTime
GetMessageA
DefWindowProcA
PostMessageA
FindWindowExA
TranslateMessage
CallNextHookEx
UnhookWindowsHookEx
RegisterClassExA
KillTimer
SetTimer
CreateWindowExA
SetWindowsHookExA
DispatchMessageA
ShowWindow
RegQueryValueExA
RegOpenKeyExA
RegSetValueExA
RegCreateKeyExA
RegCloseKey
fwrite
_adjust_fdiv
malloc
_initterm
free
strrchr
atoi
strchr
fopen
_stricmp
fclose
__CxxFrameHandler
sprintf
??3@YAXPAX@Z
??2@YAPAXI@Z
_except_handler3
SHGetValueA
HttpQueryInfoA
InternetOpenUrlA
InternetSetOptionA
InternetOpenA
InternetReadFile
InternetCloseHandle
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ