Activate
DllCanUnloadNow
DllGetClassObject
HookProc
Logoff
Logon
Start
Static task
static1
Behavioral task
behavioral1
Sample
a3b6e2e83a885bb1adf03e1a0a3bfa33_JaffaCakes118.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
a3b6e2e83a885bb1adf03e1a0a3bfa33_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
a3b6e2e83a885bb1adf03e1a0a3bfa33_JaffaCakes118
Size
37KB
MD5
a3b6e2e83a885bb1adf03e1a0a3bfa33
SHA1
c99421bc881985b9d6618e093b197f07255b0d4e
SHA256
e3b02402eaec24311134694416848630624529dd477487a38c3d133022553c91
SHA512
31f41c3706155f60b882b6051dcbc6dba25387afef408ae884d26544fc656148b83cce4dc00c45ea72ce79a35c68efaf63b3cd71848f954738046303cfb63842
SSDEEP
768:7dkl1sBaksvTlBFRxwD0WMXruNbvsL+CKsyCijUzHpafq7qg7NpFHNyxkUSa+o:7g8aksbFjSfSruNbEixZjcp0qFUkUmo
Checks for missing Authenticode signature.
resource |
---|
a3b6e2e83a885bb1adf03e1a0a3bfa33_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
StrStrA
StrStrIA
StrChrA
StrCmpNIA
PathFileExistsA
SHDeleteKeyA
StrRChrA
HttpQueryInfoA
InternetQueryOptionA
InternetSetOptionA
InternetOpenA
InternetOpenUrlA
InternetCloseHandle
InternetGetCookieA
gethostbyaddr
WSAStartup
WSACleanup
GetIpAddrTable
GetIfEntry
GetSystemDirectoryA
OpenSemaphoreA
CloseHandle
SetEvent
CreateEventA
InterlockedIncrement
InterlockedDecrement
GetVolumeInformationA
ReadFile
SetFilePointer
CreateFileA
Process32Next
Process32First
CreateToolhelp32Snapshot
GetCurrentProcess
VirtualFreeEx
WaitForSingleObject
CreateRemoteThread
GetProcAddress
GetModuleHandleA
WriteProcessMemory
VirtualAllocEx
lstrlenA
OpenProcess
Sleep
CreateMutexA
LoadLibraryA
VirtualAlloc
VirtualFree
GetLastError
SystemTimeToFileTime
GetSystemTime
GetVersionExA
CreateThread
lstrcmpiA
GetModuleFileNameA
ExitProcess
MoveFileA
GetTickCount
GetTempPathA
CreateProcessA
FreeLibrary
CopyFileA
TerminateProcess
VirtualProtect
FlushInstructionCache
SetLastError
lstrcatA
ReleaseMutex
GetFileSize
OpenMutexA
WriteFile
FindClose
DeleteFileA
SetFileAttributesA
FindFirstFileA
lstrcpyA
FileTimeToSystemTime
GetFileTime
FreeLibraryAndExitThread
ResetEvent
LocalFree
SetEndOfFile
GetWindowsDirectoryA
CreateDirectoryA
lstrcpynA
lstrcmpA
TerminateThread
LocalAlloc
TranslateMessage
PeekMessageA
SetWindowLongA
CreateWindowExA
CharLowerA
DispatchMessageA
DefWindowProcA
SetWindowsHookExA
wsprintfA
CharUpperA
CallNextHookEx
UnhookWindowsHookEx
RegDeleteValueA
LookupPrivilegeValueA
RegDeleteKeyA
RegEnumKeyA
RegOpenKeyA
SetNamedSecurityInfoA
SetEntriesInAclA
GetSecurityInfo
AllocateAndInitializeSid
SetSecurityInfo
AdjustTokenPrivileges
RegCreateKeyExA
RegQueryValueExA
RegSetValueExA
RegOpenKeyExA
RegEnumKeyExA
RegFlushKey
RegCloseKey
OpenProcessToken
ShellExecuteA
Activate
DllCanUnloadNow
DllGetClassObject
HookProc
Logoff
Logon
Start
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE