DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
c0485395c86a946bd1ccf3fd52c7e351_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
c0485395c86a946bd1ccf3fd52c7e351_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
c0485395c86a946bd1ccf3fd52c7e351_JaffaCakes118
Size
44KB
MD5
c0485395c86a946bd1ccf3fd52c7e351
SHA1
f57b0450cccb70f05acc744f2b0d72619ef3adf6
SHA256
638d58a9a1216d12d53048c5744068fb3792fbb066efd51aeaab147f13cf5b96
SHA512
a0255fd9b8bc1092ce0f68290526fe0bf40aac90c100953af0d01c1c10b02eee556b1c55c5efb1d08d8803aeed1fcd927f6e9d2be0c88a60076ee4c99829e6da
SSDEEP
768:7tkxVSz6pHpkavbfeASkSSk8rrfjszQh+egLa1:hpWeAz5k8r/sko7La
Checks for missing Authenticode signature.
resource |
---|
c0485395c86a946bd1ccf3fd52c7e351_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetLastError
CreateMutexA
CreateProcessA
GetSystemDirectoryA
GetModuleFileNameA
GetLocalTime
WinExec
GetWindowsDirectoryA
InterlockedIncrement
LoadLibraryA
GetProcAddress
VirtualAlloc
CreateThread
CloseHandle
FindWindowExA
SetTimer
KillTimer
RegisterClassExA
PostMessageA
CallNextHookEx
GetMessageA
TranslateMessage
DispatchMessageA
SetWindowsHookExA
CreateWindowExA
UnhookWindowsHookEx
DefWindowProcA
ShowWindow
RegSetValueExA
RegCreateKeyExA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
fclose
_adjust_fdiv
malloc
_initterm
free
strrchr
strchr
fopen
fwrite
_stricmp
??2@YAPAXI@Z
??3@YAXPAX@Z
_except_handler3
sprintf
__CxxFrameHandler
atoi
SHGetValueA
HttpQueryInfoA
InternetOpenUrlA
InternetSetOptionA
InternetOpenA
InternetReadFile
InternetCloseHandle
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ