Activate
DllCanUnloadNow
DllGetClassObject
HookProc
Logoff
Logon
Start
Static task
static1
Behavioral task
behavioral1
Sample
b36a72c3ec32aedfd503c0b9e7d3c5ad_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b36a72c3ec32aedfd503c0b9e7d3c5ad_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
b36a72c3ec32aedfd503c0b9e7d3c5ad_JaffaCakes118
Size
27KB
MD5
b36a72c3ec32aedfd503c0b9e7d3c5ad
SHA1
e54d583cc9349ad03e99edfed0b290ccdc7d4284
SHA256
c47db1df72bf21489f9e5775cb8efb487dbf88a6a3dd4159a38c3fe0bfe64df2
SHA512
0503992dfc7d3551413810b772c9a4982bf3cc7dd0c378419c43d5b249052714c731fac6e662bcd132fc08797f5910a00e0fc439ded9d2fdeb095495d75c204c
SSDEEP
384:nfSr/FhC0z7NGewzWJUPgsSlLE0v6vMXI5fBE6SSTtbMTBJah8JSousQYollbiER:6JhlNSpgbJXId3TeTBJoSSoupYobPZK
Checks for missing Authenticode signature.
resource |
---|
b36a72c3ec32aedfd503c0b9e7d3c5ad_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
StrRChrA
StrStrA
PathFileExistsA
StrStrIA
SHDeleteKeyA
StrCmpNIA
StrChrA
InternetQueryOptionA
InternetSetOptionA
InternetOpenA
InternetOpenUrlA
InternetCloseHandle
InternetGetCookieA
HttpQueryInfoA
WSAStartup
gethostbyaddr
WSACleanup
GetIpAddrTable
GetIfEntry
lstrlenA
Process32Next
LocalAlloc
OpenSemaphoreA
CreateToolhelp32Snapshot
Process32First
OpenProcess
SetEvent
CreateEventA
InterlockedIncrement
InterlockedDecrement
GetVolumeInformationA
CloseHandle
ReadFile
SetFilePointer
CreateFileA
VirtualAlloc
VirtualFree
GetLastError
Sleep
SystemTimeToFileTime
GetSystemTime
GetVersionExA
lstrcmpiA
GetModuleFileNameA
ExitProcess
MoveFileA
GetTickCount
GetTempPathA
CreateProcessA
FreeLibrary
WaitForSingleObject
GetProcAddress
LoadLibraryA
CopyFileA
GetSystemDirectoryA
lstrcatA
ReleaseMutex
CreateMutexA
TerminateThread
GetFileSize
WriteFile
FindClose
DeleteFileA
SetFileAttributesA
FindFirstFileA
lstrcpyA
OpenMutexA
FileTimeToSystemTime
GetFileTime
FreeLibraryAndExitThread
ResetEvent
CreateThread
LocalFree
SetEndOfFile
GetWindowsDirectoryA
CreateDirectoryA
lstrcpynA
TerminateProcess
UnhookWindowsHookEx
SetWindowsHookExA
DefWindowProcA
DispatchMessageA
TranslateMessage
PeekMessageA
SetWindowLongA
CallNextHookEx
wsprintfA
CreateWindowExA
SetSecurityInfo
RegFlushKey
RegDeleteKeyA
SetNamedSecurityInfoA
SetEntriesInAclA
GetSecurityInfo
AllocateAndInitializeSid
RegCloseKey
RegDeleteValueA
RegCreateKeyExA
RegQueryValueExA
RegSetValueExA
RegOpenKeyExA
RegEnumKeyExA
ShellExecuteA
Activate
DllCanUnloadNow
DllGetClassObject
HookProc
Logoff
Logon
Start
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE