DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
8b71044612b9d1f98d2608d02423d778_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
8b71044612b9d1f98d2608d02423d778_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
8b71044612b9d1f98d2608d02423d778_JaffaCakes118
Size
21KB
MD5
8b71044612b9d1f98d2608d02423d778
SHA1
2e3aaf060715461a872157a35a7412f402131e42
SHA256
697eefb54559f85270c18ffdc1cea2f07048775b404582c580a850560e69264a
SHA512
65600a35d71409915763788bc7a87bfd9a7d634d6c6111c7b7ce6ebc44d9892285873830bdf1f2e19d6672f70f91448b7f015cfab2761840c130fc1b863253ac
SSDEEP
384:8+syXc3/5Q+e6C3rpAwqG+AiS3bB6ex+ZjmqOZFCOgW/p:Gys3+HDq+iSzxImNj7gk
Checks for missing Authenticode signature.
resource |
---|
8b71044612b9d1f98d2608d02423d778_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
UuidToStringA
htons
InternetCrackUrlA
SHDeleteKeyA
ObtainUserAgentString
IsWindowVisible
CoTaskMemFree
VariantClear
ord58
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
_purecall
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE