DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
d05214efacafa41955300edf8410c71b_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d05214efacafa41955300edf8410c71b_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
d05214efacafa41955300edf8410c71b_JaffaCakes118
Size
44KB
MD5
d05214efacafa41955300edf8410c71b
SHA1
dbad3185c61979a5ae48455ff8e37425c64a5660
SHA256
fae4d918d0abf4ec05460b3e37015c21ee09e3e4b5f0bd1af16355b0e37fae11
SHA512
8d25f263002876ea6cf29ab571d09c7a77369e42e2670f404edae1ad87b5614e6e12d6e7c9981afa5676cad09a13a3d09762d824ac37a204d7f930286361acac
SSDEEP
768:Gh5QyjsxPt2TpkavQCYiCF6SBrx5gLa1sG:qeI2PFBtwLaWG
Checks for missing Authenticode signature.
resource |
---|
d05214efacafa41955300edf8410c71b_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetLastError
CreateMutexA
InterlockedIncrement
GetLocalTime
VirtualAlloc
LoadLibraryA
WinExec
GetWindowsDirectoryA
CreateThread
GetSystemDirectoryA
GetModuleFileNameA
CreateProcessA
CloseHandle
GetProcAddress
FindWindowExA
ShowWindow
CreateWindowExA
DispatchMessageA
PostMessageA
UnhookWindowsHookEx
SetWindowsHookExA
CallNextHookEx
KillTimer
SetTimer
GetMessageA
RegisterClassExA
DefWindowProcA
TranslateMessage
RegSetValueExA
RegCreateKeyExA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
_except_handler3
_adjust_fdiv
malloc
_initterm
free
strchr
fopen
fwrite
fclose
_stricmp
__CxxFrameHandler
??2@YAPAXI@Z
sprintf
strrchr
atoi
??3@YAXPAX@Z
SHGetValueA
HttpQueryInfoA
InternetOpenUrlA
InternetSetOptionA
InternetOpenA
InternetReadFile
InternetCloseHandle
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ