DllGetClassObject
DllRegisterServer
DllUnregisterServer
Behavioral task
behavioral1
Sample
bd1da207b0eaf92039a2923c86567ca6_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
bd1da207b0eaf92039a2923c86567ca6_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
bd1da207b0eaf92039a2923c86567ca6_JaffaCakes118
Size
27KB
MD5
bd1da207b0eaf92039a2923c86567ca6
SHA1
c335b3c11ddf2d9775fdbf77efffaaed26f0a34a
SHA256
9ee7c05f494683087c7184e02581d9c3e38ec28fe8c889a30d5af63588ae5879
SHA512
3a04db91f82fc61e90db19877ab9ccc8e954aa2c264395901810452af90f0ffe5d4ba2fef5709fda44474de0303568aa20794da69d486a4bc7a9d7b5ecdd3325
SSDEEP
96:M4apnOzLpHGNc3Qy5YaANYq7zIQMxY4Q67Rp2w3K9vW8dNxjo3j409Jr9KwNAlf2:vc2Ucl5qn7zlq/OxkR9JBLNA0OAm2K4
resource | yara_rule |
---|---|
sample | upx |
Checks for missing Authenticode signature.
resource |
---|
bd1da207b0eaf92039a2923c86567ca6_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
LocalReAlloc
lstrcmpiA
MultiByteToWideChar
GetVersionExA
lstrcmpA
GetModuleHandleA
LocalSize
LocalAlloc
GlobalFree
lstrlenA
lstrcpyA
GlobalAlloc
LocalFree
GetModuleFileNameA
CloseHandle
TerminateThread
CreateThread
Sleep
RegEnumKeyExA
RegDeleteKeyA
RegOpenKeyExA
RegCreateKeyExA
RegQueryValueExA
RegSetValueExA
RegCloseKey
_adjust_fdiv
malloc
free
wcslen
_initterm
memset
memcmp
CoInitialize
CoUninitialize
CoGetInterfaceAndReleaseStream
CoMarshalInterThreadInterfaceInStream
lineOpenA
lineInitialize
lineNegotiateAPIVersion
lineShutdown
lineGetNewCalls
lineGetCallInfoA
UnhookWindowsHookEx
CallNextHookEx
SetWindowsHookExA
GetClassNameA
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE