DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
c1329e67f44345fef479d46f77d058a2_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c1329e67f44345fef479d46f77d058a2_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
c1329e67f44345fef479d46f77d058a2_JaffaCakes118
Size
44KB
MD5
c1329e67f44345fef479d46f77d058a2
SHA1
8501d01aa4390a45cc73862773c93845656ae649
SHA256
4ca486ccb2d69202b0299f1620b613a28c5c60f942c61b6235fdc2dfb428c6e4
SHA512
5719061a4ef025c0f336109ed21b7030413168e55a69d0567c0b1feae5412d983340a048b464358f57c4513a9e619c31e462645ca5bcafe4a1de9be1287cb658
SSDEEP
768:rT1n/poX2OsyHPk+pkavjPTw3g+oPQzNz48gLa1vi:P71P3cQzFULaN
Checks for missing Authenticode signature.
resource |
---|
c1329e67f44345fef479d46f77d058a2_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetLastError
CreateMutexA
CreateThread
VirtualAlloc
CloseHandle
WinExec
GetWindowsDirectoryA
GetSystemDirectoryA
CreateProcessA
LoadLibraryA
GetProcAddress
GetLocalTime
InterlockedIncrement
GetModuleFileNameA
CallNextHookEx
ShowWindow
CreateWindowExA
RegisterClassExA
FindWindowExA
TranslateMessage
DispatchMessageA
SetWindowsHookExA
KillTimer
SetTimer
DefWindowProcA
GetMessageA
PostMessageA
UnhookWindowsHookEx
RegQueryValueExA
RegOpenKeyExA
RegSetValueExA
RegCreateKeyExA
RegCloseKey
_except_handler3
_adjust_fdiv
malloc
_initterm
free
strchr
fopen
fwrite
fclose
_stricmp
??2@YAPAXI@Z
atoi
strrchr
sprintf
__CxxFrameHandler
??3@YAXPAX@Z
InternetSetOptionA
InternetOpenA
InternetReadFile
InternetCloseHandle
InternetOpenUrlA
HttpQueryInfoA
SHGetValueA
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ