DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
71156a8d5ad86b3c595d3187552d403b_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
71156a8d5ad86b3c595d3187552d403b_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
71156a8d5ad86b3c595d3187552d403b_JaffaCakes118
Size
44KB
MD5
71156a8d5ad86b3c595d3187552d403b
SHA1
32a84fe5e676cb455e2333b194ce950c6ee996e7
SHA256
772d4ac7cd810d98f4b578539c2f78548d4c65576965831fb3649c18fc3f6a36
SHA512
2b76f81b51d21e7b22a4113aca449f460b540f9891e51a1e9e924da6d896fdf47a2cb5c9bac64ebeed0b63933874d4794bde810ca68a93e80916cbf619f19c80
SSDEEP
768:aLh+ClTOyRxmpkav7FeDUmMEWoJ9gLa1cd:SNT33VyeYEBYLa6
Checks for missing Authenticode signature.
resource |
---|
71156a8d5ad86b3c595d3187552d403b_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
InterlockedIncrement
CloseHandle
GetLastError
CreateMutexA
GetLocalTime
GetModuleFileNameA
VirtualAlloc
CreateProcessA
GetSystemDirectoryA
GetWindowsDirectoryA
WinExec
LoadLibraryA
GetProcAddress
CreateThread
ShowWindow
CreateWindowExA
DefWindowProcA
SetTimer
SetWindowsHookExA
TranslateMessage
DispatchMessageA
UnhookWindowsHookEx
CallNextHookEx
FindWindowExA
PostMessageA
GetMessageA
RegisterClassExA
KillTimer
RegSetValueExA
RegCreateKeyExA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
fopen
_adjust_fdiv
malloc
_initterm
free
_except_handler3
atoi
strrchr
strchr
_stricmp
fwrite
fclose
sprintf
__CxxFrameHandler
??3@YAXPAX@Z
??2@YAPAXI@Z
InternetSetOptionA
InternetOpenA
InternetReadFile
InternetCloseHandle
InternetOpenUrlA
HttpQueryInfoA
SHGetValueA
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ