DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
709bea4b4b50dfffbfece2f9498785fe_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
709bea4b4b50dfffbfece2f9498785fe_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
709bea4b4b50dfffbfece2f9498785fe_JaffaCakes118
Size
48KB
MD5
709bea4b4b50dfffbfece2f9498785fe
SHA1
f18774bbf93e12a4a23f3d9a3077f825650310e0
SHA256
2659305b8ec342ff2bf6b13e5dab9886d5b772d3927eaeb5addcf1343da6b6fe
SHA512
066a7c464e7f56f9b6e99fe84da1ae2f09e0cecf9b9f9a9fd6f7461a117af829bb3504d7b2639288b6d42df6cdecfd0182835555c292cf17e150ee467db02424
SSDEEP
768:/CbjjQXwYCyHaP3RzpZUNm30MtUnQvnY25s668:/AQXYy6vRlWNm30MtUnQvn9s668
Checks for missing Authenticode signature.
resource |
---|
709bea4b4b50dfffbfece2f9498785fe_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
WSAStartup
socket
htons
connect
ioctlsocket
gethostbyname
send
closesocket
recv
LocalFree
CreateThread
IsBadStringPtrA
LoadLibraryA
Sleep
GetProcAddress
GetLastError
GetSystemInfo
IsBadReadPtr
VirtualQuery
WideCharToMultiByte
GetModuleHandleA
GetTickCount
InterlockedDecrement
CloseHandle
CreateFileA
lstrcpynA
MapViewOfFile
CreateFileMappingA
OpenFileMappingA
wsprintfA
GetWindowTextA
GetParent
ScreenToClient
GetClassNameA
PeekMessageA
CallNextHookEx
CoCreateInstance
OleRun
SysFreeString
SysAllocString
VariantClear
GetErrorInfo
_initterm
_adjust_fdiv
_strupr
_strdup
_CxxThrowException
??1type_info@@UAE@XZ
_onexit
__dllonexit
strchr
atoi
free
isalpha
isdigit
realloc
malloc
wcslen
??2@YAPAXI@Z
__CxxFrameHandler
sprintf
??3@YAXPAX@Z
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ