DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
6f8c4373349844724570da602f64dab0_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
6f8c4373349844724570da602f64dab0_JaffaCakes118.dll
Resource
win10v2004-20240704-en
Target
6f8c4373349844724570da602f64dab0_JaffaCakes118
Size
44KB
MD5
6f8c4373349844724570da602f64dab0
SHA1
4efced5e6c162d4e79562199e11e3e0fa46e2951
SHA256
406d4fd56fca6d2d17a0d903ffa21b06510290ad864c87d94ad8b9c4abc081e2
SHA512
982d31e7b1dcff4166b720891fb7b31207af7caf30c6e17b1833b5521f15aaf75f3e4a76f9536d6a08f97a10d2a59dc30cbbac74d468f42646cf5bc282c0993f
SSDEEP
768:vcJtYpkavHHOmJa6P9hbtShmiArDki7JgkZDgLa1:0JtrQAQ9hbttrDpCE8La
Checks for missing Authenticode signature.
resource |
---|
6f8c4373349844724570da602f64dab0_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
CreateProcessA
GetSystemDirectoryA
GetLastError
GetProcAddress
CreateMutexA
WinExec
GetWindowsDirectoryA
VirtualAlloc
GetModuleFileNameA
LoadLibraryA
CreateThread
CloseHandle
GetLocalTime
InterlockedIncrement
TranslateMessage
GetMessageA
ShowWindow
CreateWindowExA
DispatchMessageA
FindWindowExA
PostMessageA
CallNextHookEx
KillTimer
SetTimer
DefWindowProcA
SetWindowsHookExA
UnhookWindowsHookEx
RegisterClassExA
RegSetValueExA
RegCreateKeyExA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
fclose
_adjust_fdiv
malloc
_initterm
free
_except_handler3
strchr
fopen
fwrite
_stricmp
strrchr
__CxxFrameHandler
atoi
??3@YAXPAX@Z
??2@YAPAXI@Z
sprintf
SHGetValueA
HttpQueryInfoA
InternetOpenUrlA
InternetSetOptionA
InternetOpenA
InternetReadFile
InternetCloseHandle
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ