DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
ce55a91e17a40a847d9c688427239642_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ce55a91e17a40a847d9c688427239642_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
ce55a91e17a40a847d9c688427239642_JaffaCakes118
Size
64KB
MD5
ce55a91e17a40a847d9c688427239642
SHA1
ff785155e3d0f45381e5e71783543c70013db8dd
SHA256
e3ee7dacc0a97c23c4333c9c4b4acf12b371c53d6c2ae8383265f4182d4ef180
SHA512
907f18d6de6bbc0783514d2922a12019703558c49c638c1c9e022e84e2497c6c1916aa6fd75fb55dbc33d64f6d50246d20e334c38503f2645ddbb186b0ec2734
SSDEEP
384:YpBHn85813dLnfWU0Pba3EumS47d2/iljMPEGPnF1i3MdkhJuCjZj/J/zGb:YPG+++TmS4x2/0MP7fFI3DhMCjR8
Checks for missing Authenticode signature.
resource |
---|
ce55a91e17a40a847d9c688427239642_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
LoadLibraryA
FindClose
FindFirstFileA
GetModuleFileNameA
GetCurrentDirectoryA
WinExec
SetEvent
OpenEventA
CreateEventA
TerminateProcess
GetCurrentProcess
DisableThreadLibraryCalls
InitializeCriticalSection
DeleteCriticalSection
LeaveCriticalSection
InterlockedIncrement
EnterCriticalSection
InterlockedDecrement
VirtualAlloc
VirtualProtect
Module32First
Module32Next
lstrlenW
MultiByteToWideChar
WideCharToMultiByte
OpenProcess
VirtualProtectEx
WriteProcessMemory
CreateToolhelp32Snapshot
CreateThread
CloseHandle
Sleep
GetPrivateProfileIntA
lstrlenA
lstrcpyA
GetModuleHandleA
IsBadReadPtr
GetCurrentProcessId
GetWindowTextA
GetForegroundWindow
GetWindowThreadProcessId
EnumWindows
wsprintfA
SetWindowsHookExA
CallNextHookEx
KillTimer
SetTimer
RegOpenKeyA
RegSetValueExA
RegCloseKey
LoadRegTypeLi
SysStringLen
SysFreeString
memcmp
isprint
strcpy
strstr
atoi
strcmp
memcpy
??3@YAXPAX@Z
_purecall
strcat
strrchr
free
_initterm
malloc
_adjust_fdiv
??2@YAPAXI@Z
memset
strlen
sprintf
_itoa
_strcmpi
ord32
ord18
ord15
ord30
ord58
ord23
ord21
ord16
ord57
StrStrIA
InternetCloseHandle
InternetOpenUrlA
InternetOpenA
InternetReadFile
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ