Activate
DllCanUnloadNow
DllGetClassObject
HookProc
Logoff
Logon
Start
Static task
static1
Behavioral task
behavioral1
Sample
a8bf287712f5e53f36736a6b8cd6873c_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a8bf287712f5e53f36736a6b8cd6873c_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
a8bf287712f5e53f36736a6b8cd6873c_JaffaCakes118
Size
38KB
MD5
a8bf287712f5e53f36736a6b8cd6873c
SHA1
78ddfa8c128cd303f6de8931ec4170fbe1962c3e
SHA256
f4c42bd84813e85beab762093e47c8a687f8dca3904abfbfd17ba5ee140c2046
SHA512
930344344f7885254bf524c5f32e32cad25ff393c363d7c22a6b8b9a8243ba9714ddf7c309f25bab7fc25bcf8bb374b9db54a68b8d762f95bee4135044105e85
SSDEEP
768:IKJWfE+S7wYn/rS2nPIHwD2UxiMBD68eBXL3fHpwk/:Zt+S8Yn/jP56Uo/5rfJwk
Checks for missing Authenticode signature.
resource |
---|
a8bf287712f5e53f36736a6b8cd6873c_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
StrStrA
StrStrIA
StrChrA
StrCmpNIA
PathFileExistsA
SHDeleteKeyA
StrRChrA
HttpQueryInfoA
InternetQueryOptionA
InternetSetOptionA
InternetOpenA
InternetOpenUrlA
InternetCloseHandle
InternetGetCookieA
gethostbyaddr
WSAStartup
WSACleanup
GetIpAddrTable
GetIfEntry
GetSystemDirectoryA
OpenSemaphoreA
CloseHandle
SetEvent
CreateEventA
InterlockedIncrement
InterlockedDecrement
GetVolumeInformationA
ReadFile
SetFilePointer
CreateFileA
Process32Next
Process32First
CreateToolhelp32Snapshot
GetCurrentProcess
VirtualFreeEx
WaitForSingleObject
CreateRemoteThread
GetProcAddress
GetModuleHandleA
WriteProcessMemory
VirtualAllocEx
lstrlenA
OpenProcess
Sleep
CreateMutexA
LoadLibraryA
VirtualAlloc
VirtualFree
GetLastError
SystemTimeToFileTime
GetSystemTime
GetVersionExA
CreateThread
lstrcmpiA
GetModuleFileNameA
ExitProcess
MoveFileA
GetTickCount
GetTempPathA
CreateProcessA
FreeLibrary
CopyFileA
TerminateProcess
VirtualProtect
FlushInstructionCache
SetLastError
lstrcatA
ReleaseMutex
GetFileSize
OpenMutexA
WriteFile
FindClose
DeleteFileA
SetFileAttributesA
FindFirstFileA
lstrcpyA
FileTimeToSystemTime
GetFileTime
FreeLibraryAndExitThread
ResetEvent
LocalFree
SetEndOfFile
GetWindowsDirectoryA
CreateDirectoryA
lstrcpynA
lstrcmpA
TerminateThread
LocalAlloc
TranslateMessage
PeekMessageA
SetWindowLongA
CreateWindowExA
CharLowerA
DispatchMessageA
DefWindowProcA
SetWindowsHookExA
wsprintfA
CharUpperA
CallNextHookEx
UnhookWindowsHookEx
RegDeleteValueA
LookupPrivilegeValueA
RegDeleteKeyA
RegEnumKeyA
RegOpenKeyA
SetNamedSecurityInfoA
SetEntriesInAclA
GetSecurityInfo
AllocateAndInitializeSid
SetSecurityInfo
AdjustTokenPrivileges
RegCreateKeyExA
RegQueryValueExA
RegSetValueExA
RegOpenKeyExA
RegEnumKeyExA
RegFlushKey
RegCloseKey
OpenProcessToken
ShellExecuteA
Activate
DllCanUnloadNow
DllGetClassObject
HookProc
Logoff
Logon
Start
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE