DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
860fc1b9a38fda474d3ef0434cbe8082_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
860fc1b9a38fda474d3ef0434cbe8082_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
860fc1b9a38fda474d3ef0434cbe8082_JaffaCakes118
Size
48KB
MD5
860fc1b9a38fda474d3ef0434cbe8082
SHA1
eeaa9c0033c68f6db579b0bd55bcbc6d2eb226d3
SHA256
165dba56d6f966ffc038d3c3a0b86946888aef8535fb0350ae6ddfd9db05ac1b
SHA512
e117e514ec883a0d3e763b1dfe649987425a1c51c67b8a715d8545f9c34eb214cc8f262aff000f7be7981024e9c9230cd9c767f5f992e0146c00b26b29836782
SSDEEP
768:rPIvgS43Z4++hKjWLG53eB0/sq2KCLuyJNWAs673w2X:84SmtwGsQCrns6M
Checks for missing Authenticode signature.
resource |
---|
860fc1b9a38fda474d3ef0434cbe8082_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
DeleteCriticalSection
LeaveCriticalSection
InterlockedIncrement
EnterCriticalSection
InterlockedDecrement
HeapAlloc
GetSystemInfo
GetVersionExA
HeapCreate
HeapDestroy
lstrlenW
MultiByteToWideChar
lstrlenA
GetShortPathNameA
GetModuleHandleA
InitializeCriticalSection
Process32Next
Process32First
GetCommandLineW
GetLocalTime
GetSystemDirectoryA
Sleep
CreateThread
WideCharToMultiByte
GetWindowsDirectoryA
DeleteFileA
DisableThreadLibraryCalls
GetCurrentProcessId
CreateEventA
GetLastError
CloseHandle
WritePrivateProfileStringA
LoadLibraryA
GetModuleFileNameA
GetProcAddress
PostMessageA
DefWindowProcA
GetMessageA
TranslateMessage
DispatchMessageA
IsWindow
RegisterClassExA
CreateWindowExA
ShowWindow
SetWindowTextA
SendMessageA
KillTimer
SetTimer
FindWindowExA
CallNextHookEx
RegSetValueExA
RegCreateKeyExA
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
CommandLineToArgvW
CoCreateInstance
SysAllocString
VariantClear
SysStringLen
LoadRegTypeLi
SysFreeString
strchr
fopen
_strlwr
fwrite
fclose
strstr
strcmp
free
_initterm
malloc
_adjust_fdiv
_stricmp
strrchr
rand
strlen
memcmp
memcpy
memset
_purecall
strcpy
strcat
_access
??2@YAPAXI@Z
??3@YAXPAX@Z
sprintf
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ