_DllMain@12
load
Static task
static1
Behavioral task
behavioral1
Sample
696c2565284a27125098f50de6891821_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
696c2565284a27125098f50de6891821_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
696c2565284a27125098f50de6891821_JaffaCakes118
Size
68KB
MD5
696c2565284a27125098f50de6891821
SHA1
6c3e70f11e48246ff8eb4c3c96a1e25e9a349096
SHA256
bd9bc3c8316c052add4a558ba9445210962171e86d9c4a4ee46c994e0688753b
SHA512
fe9b0557a4c6177556df906459d90de18f10d5cb448833e7dd51448c3168e82b3567755ba885aa8f31ec46c72d1f7e17d91e42de05f7000b12f350fc5e197749
SSDEEP
1536:WgKGnkMO+AI2nc2XF2pMBzQFD2MYXwIY2FpaGg6EOUzT8x/weNt0OG9scoO9i:WgRkMO+v0c2V2pMBzA2MYXwIbFpY6EOt
Checks for missing Authenticode signature.
resource |
---|
696c2565284a27125098f50de6891821_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
atoi
strncpy
fgets
fopen
sprintf
vsprintf
strncmp
_adjust_fdiv
malloc
_initterm
free
_onexit
__dllonexit
exit
strtok
fclose
_beginthreadex
fputs
fputc
fwrite
??2@YAPAXI@Z
rand
srand
strchr
strcspn
strncat
WSAStartup
setsockopt
gethostname
WSAGetLastError
connect
inet_ntoa
ioctlsocket
gethostbyname
socket
select
recv
closesocket
ntohs
htons
sendto
send
FtpSetCurrentDirectoryA
InternetOpenUrlA
InternetReadFile
FtpCreateDirectoryA
FtpPutFileA
InternetConnectA
InternetCloseHandle
InternetOpenA
RasEnumConnectionsA
RasGetConnectStatusA
HeapAlloc
GetProcessHeap
HeapFree
GetTickCount
GetSystemDirectoryA
OpenMutexA
Sleep
lstrcpynA
GetProcAddress
LoadLibraryA
GetModuleHandleA
CreateMutexA
ExpandEnvironmentStringsA
FindClose
FindNextFileA
GetFullPathNameA
WinExec
DeleteFileA
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
CreateThread
FindFirstFileA
CloseHandle
RegisterClassA
CreateWindowExA
DefWindowProcA
KillTimer
DestroyWindow
PostQuitMessage
SetTimer
wsprintfA
GetMessageA
DispatchMessageA
TranslateMessage
GetStockObject
RegCloseKey
RegSetValueExA
RegCreateKeyExA
RegQueryValueExA
RegOpenKeyExA
_DllMain@12
load
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ