DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
cfbb9f5206ffef9bac17ef4994a9b117_JaffaCakes118.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
cfbb9f5206ffef9bac17ef4994a9b117_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
cfbb9f5206ffef9bac17ef4994a9b117_JaffaCakes118
Size
44KB
MD5
cfbb9f5206ffef9bac17ef4994a9b117
SHA1
39e8bb6e694f7c12d57733a29e6ff74c0ea97f4c
SHA256
339fe80330a11aacf1d7ffecb9b5e68c84c4883ca18a3d10669a087a61e9e490
SHA512
cb6ae387009978b2278448027b47ab90e6b296c562d7ec6c89483d413670e1a27c4fcaac118dc589cc9a9ee26fad1fed2aff8de2cb64a7608d7f3dbc7b88af87
SSDEEP
768:FfUDYeUSsaANCag3Npkav4TKnVQ/TYLuhDL5/c5gLa13YYE:FhpRpFLVTLau9
Checks for missing Authenticode signature.
resource |
---|
cfbb9f5206ffef9bac17ef4994a9b117_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetLastError
CloseHandle
CreateProcessA
InterlockedIncrement
CreateThread
LoadLibraryA
VirtualAlloc
GetProcAddress
GetModuleFileNameA
GetSystemDirectoryA
GetWindowsDirectoryA
WinExec
GetLocalTime
CreateMutexA
DefWindowProcA
PostMessageA
FindWindowExA
DispatchMessageA
CallNextHookEx
SetTimer
UnhookWindowsHookEx
CreateWindowExA
ShowWindow
RegisterClassExA
GetMessageA
KillTimer
SetWindowsHookExA
TranslateMessage
RegQueryValueExA
RegOpenKeyExA
RegSetValueExA
RegCreateKeyExA
RegCloseKey
??2@YAPAXI@Z
_adjust_fdiv
malloc
_initterm
free
_except_handler3
__CxxFrameHandler
atoi
strrchr
_stricmp
??3@YAXPAX@Z
strchr
fclose
fwrite
fopen
sprintf
InternetSetOptionA
InternetOpenA
InternetReadFile
InternetCloseHandle
InternetOpenUrlA
HttpQueryInfoA
SHGetValueA
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ