DllGetBlackBox
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
7158b2e735c589533db8d20d31f30a9f_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
7158b2e735c589533db8d20d31f30a9f_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
7158b2e735c589533db8d20d31f30a9f_JaffaCakes118
Size
140KB
MD5
7158b2e735c589533db8d20d31f30a9f
SHA1
6d5cb533829d85a9b97fbea554097a0ff580fdf1
SHA256
a77bc7028ec6addf80558a575498b16401347ce5e701c49bd77abbaf9ab96039
SHA512
3ce163680910b6f7c07e74f634a41967477f96bd38931a2829b3f12dd869825a7fff6689c771bf82740eec9c8d9ecc8059eff202f6efda12f243177c8c5109bc
SSDEEP
1536:LMHbP31/n1Fp7vae02iNnyD/LvJbQg470ZupcEcoMM0Zog4efFqXg4lwEsQFAX:4HbP31/n1r7vIFRh70J4ewXgGwxQF8
Checks for missing Authenticode signature.
resource |
---|
7158b2e735c589533db8d20d31f30a9f_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
_adjust_fdiv
malloc
_initterm
free
_purecall
_ftol
memset
_except_handler3
??2@YAPAXI@Z
??3@YAXPAX@Z
DisableThreadLibraryCalls
CreateFileMappingA
MapViewOfFile
UnmapViewOfFile
GetFileSize
ReadFile
ExitProcess
GetCurrentThread
CloseHandle
ResumeThread
GetThreadContext
SuspendThread
FreeLibrary
GetProcAddress
LoadLibraryA
GetTickCount
IsBadWritePtr
IsBadReadPtr
CreateProcessA
GetModuleFileNameA
VirtualProtect
CreateFileA
GetVersionExA
lstrcpyA
lstrlenA
GetCurrentProcess
GetLastError
GetVolumeInformationA
GetDriveTypeA
GetLogicalDriveStringsA
GetModuleHandleA
GetSystemInfo
DeviceIoControl
GetExitCodeThread
WaitForSingleObject
CreateThread
DuplicateHandle
RegCreateKeyExA
RegSetValueExA
RegCloseKey
DllGetBlackBox
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ