DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
697115d76205f95d6fa23af7a31bc6bf_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
697115d76205f95d6fa23af7a31bc6bf_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
697115d76205f95d6fa23af7a31bc6bf_JaffaCakes118
Size
156KB
MD5
697115d76205f95d6fa23af7a31bc6bf
SHA1
37f8e7980d658e36254ceac9666ee2b3086ff035
SHA256
f0a0823cfb115e9ecb62e25695df8d0ff7075ac9045e06de3a33e763ab463164
SHA512
0e5972d57578812f4901858547ebe0d0f102975e3ee7f855cbae90038e0e693e34687905418b7086e38e322b6042a8257433ffec0d27b62e869d5addc7a91c9a
SSDEEP
384:IGd63yBou7yC6ucSbJTl8+79/Ku/kyVLlExFFl20sj:Hs34VybghZkuMyVLlMFFgJ
Checks for missing Authenticode signature.
resource |
---|
697115d76205f95d6fa23af7a31bc6bf_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
EnterCriticalSection
InterlockedDecrement
HeapAlloc
GetSystemInfo
GetVersionExA
InterlockedIncrement
lstrlenW
DebugBreak
HeapFree
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
CreateThread
OutputDebugStringA
Sleep
WinExec
CreateFileA
WriteFile
CloseHandle
GetWindowsDirectoryA
FindFirstFileA
HeapCreate
DisableThreadLibraryCalls
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
LoadRegTypeLi
SysFreeString
SysStringLen
ord32
ord21
ord58
ord30
ord15
ord18
ord16
ord23
ord57
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ