DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
9696f98841269d8eb308438ff8988c11_JaffaCakes118.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
9696f98841269d8eb308438ff8988c11_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
9696f98841269d8eb308438ff8988c11_JaffaCakes118
Size
44KB
MD5
9696f98841269d8eb308438ff8988c11
SHA1
cb829c5356cee7a21d424967eb3154b37dce4343
SHA256
03380347a16894f86c0695ab3fc01a170493455e685554f9d8071c233c02afca
SHA512
eda26a12f55fceeb6a009ef5b64f1e028095e2efbec4d14b92659040931b29ca5773b198c47d74cd55bab5bb94118eee22eb0865e837ecd06db2736ec495ab2d
SSDEEP
768:+08thAjpkavI53tpVHwq/SX9DV+lP1ZgLa1D:+VtlbdISILaF
Checks for missing Authenticode signature.
resource |
---|
9696f98841269d8eb308438ff8988c11_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
InterlockedIncrement
GetLocalTime
CreateThread
VirtualAlloc
WinExec
LoadLibraryA
GetLastError
CreateMutexA
GetProcAddress
GetSystemDirectoryA
GetModuleFileNameA
CreateProcessA
CloseHandle
GetWindowsDirectoryA
DispatchMessageA
TranslateMessage
GetMessageA
ShowWindow
CallNextHookEx
RegisterClassExA
KillTimer
SetTimer
DefWindowProcA
FindWindowExA
PostMessageA
SetWindowsHookExA
UnhookWindowsHookEx
CreateWindowExA
RegSetValueExA
RegCreateKeyExA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
fclose
_adjust_fdiv
malloc
_initterm
free
__CxxFrameHandler
strchr
fopen
fwrite
_stricmp
_except_handler3
atoi
sprintf
??3@YAXPAX@Z
??2@YAPAXI@Z
strrchr
SHGetValueA
HttpQueryInfoA
InternetOpenUrlA
InternetSetOptionA
InternetOpenA
InternetReadFile
InternetCloseHandle
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ