AInit
DllCanUnloadNow
DllCanUnloadNow@0
DllGetClassObject
DllGetClassObject@12
DllRegisterServer
DllUnregisterServer
KeyboardProc
KeyboardProc@12
Static task
static1
Behavioral task
behavioral1
Sample
6eef0735e5c939f5d2bc3a707a22645b_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
6eef0735e5c939f5d2bc3a707a22645b_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
6eef0735e5c939f5d2bc3a707a22645b_JaffaCakes118
Size
51KB
MD5
6eef0735e5c939f5d2bc3a707a22645b
SHA1
101a8a169e13f2e04704784afa75ac26bf9bdb66
SHA256
cf82bc4f9ff68a489838f78384205ea9845119e894d5bce6fc2a855b5c2fc7d6
SHA512
b3bfb2c4347c08197aeb1488ad09455153812a7dc4e24e56110621d126e8f218780840edf85e3521947977069a5e439eeb2c51c78e616730d92844cecd6b58e1
SSDEEP
768:Ol7uU8FgPN1md/buIbPPv8hbanF0/TlzglbdM1Tk+FAuHb+eEPAs4g8mZJzZzF:66oNuDnbPnrn2FCS1HFEPAZgjzZzF
Checks for missing Authenticode signature.
resource |
---|
6eef0735e5c939f5d2bc3a707a22645b_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
IMAGE_FILE_DLL
GetUserNameA
RegCloseKey
RegCreateKeyA
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
PFXExportCertStore
CertOpenStore
AddAtomA
CloseHandle
CreateFileA
CreateSemaphoreA
CreateThread
DeleteFileA
ExitThread
FindAtomA
FindFirstFileA
FindNextFileA
GetAtomNameA
GetComputerNameA
GetCurrentThreadId
GetFileSize
GetLastError
GetModuleFileNameA
GetModuleHandleA
GetSystemDirectoryA
GetTempPathA
GetTickCount
GlobalAlloc
GlobalFree
InterlockedDecrement
InterlockedIncrement
MultiByteToWideChar
ReadFile
ReleaseSemaphore
SetFileAttributesA
SetLastError
Sleep
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
WaitForSingleObject
WinExec
WriteFile
_write
__dllonexit
_assert
_errno
_iob
abort
atoi
fclose
fflush
fopen
fprintf
fputs
free
malloc
memcmp
memcpy
memset
rand
srand
strcat
strcmp
strcpy
strlen
strstr
SafeArrayAccessData
SafeArrayCreateVector
SafeArrayDestroy
SafeArrayUnaccessData
SysAllocStringByteLen
SysFreeString
SysStringLen
VariantClear
ShellExecuteA
CallNextHookEx
FindWindowExA
GetKeyNameTextA
SetWindowsHookExA
UnhookWindowsHookEx
wsprintfA
GetProfilesDirectoryA
HttpAddRequestHeadersA
HttpEndRequestA
HttpOpenRequestA
HttpQueryInfoA
HttpSendRequestExA
InternetCloseHandle
InternetConnectA
InternetOpenA
InternetOpenUrlA
InternetReadFile
InternetSetOptionA
InternetWriteFile
AInit
DllCanUnloadNow
DllCanUnloadNow@0
DllGetClassObject
DllGetClassObject@12
DllRegisterServer
DllUnregisterServer
KeyboardProc
KeyboardProc@12
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ