DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
d71b6723c860af0e28083e6c006cfa94_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
d71b6723c860af0e28083e6c006cfa94_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
d71b6723c860af0e28083e6c006cfa94_JaffaCakes118
Size
44KB
MD5
d71b6723c860af0e28083e6c006cfa94
SHA1
2b00287f51075b05aaea1c00ec66107730d74946
SHA256
a21e1ba3a7a569a306f98de263962fc75d4f38e92ee6a62b78622273f1c0ecff
SHA512
0888e27b21b3f2877e1e690a66c6844cccf0c160495151e2ed87d76efd89b12401fb298b4e02eae12ad9041c197ec7de664e645142cbbd09050c8f55fbe70889
SSDEEP
768:S8CQLps0v2pkavwIXsisIxlQeo0mtxRj3gLa1V:SJCNYcIxyvPjwLa
Checks for missing Authenticode signature.
resource |
---|
d71b6723c860af0e28083e6c006cfa94_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetWindowsDirectoryA
GetSystemDirectoryA
GetLastError
CreateMutexA
CreateProcessA
WinExec
InterlockedIncrement
GetLocalTime
LoadLibraryA
GetProcAddress
VirtualAlloc
CreateThread
CloseHandle
GetModuleFileNameA
DispatchMessageA
TranslateMessage
GetMessageA
SetWindowsHookExA
FindWindowExA
SetTimer
CallNextHookEx
DefWindowProcA
RegisterClassExA
CreateWindowExA
ShowWindow
KillTimer
PostMessageA
UnhookWindowsHookEx
RegSetValueExA
RegCreateKeyExA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
??3@YAXPAX@Z
_adjust_fdiv
malloc
_initterm
free
atoi
strrchr
__CxxFrameHandler
??2@YAPAXI@Z
_stricmp
strchr
sprintf
_except_handler3
fclose
fwrite
fopen
SHGetValueA
HttpQueryInfoA
InternetOpenUrlA
InternetSetOptionA
InternetOpenA
InternetReadFile
InternetCloseHandle
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ