DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
da66d96fe7d784f88988864530ce2de4_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
da66d96fe7d784f88988864530ce2de4_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
da66d96fe7d784f88988864530ce2de4_JaffaCakes118
Size
44KB
MD5
da66d96fe7d784f88988864530ce2de4
SHA1
7df79b275d986320f87410078757785c4c804b9a
SHA256
6f1f4bb6a744789b5f78ba8eb01126f0aab4f74df45d6650abcd12b348cb8282
SHA512
8486f122a84a387941d56a3361efa2ed631e8388711085cc9767c1be3d4da752f883d91f7654a24824a387dcd44153c85125e2d0563e4b99b9e17008c45abcac
SSDEEP
768:Q1Ppkavo4WQLY/ebBtFVYwD14w/gLa1JZt:Qkr3QNt0p1LajZ
Checks for missing Authenticode signature.
resource |
---|
da66d96fe7d784f88988864530ce2de4_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetLocalTime
InterlockedIncrement
GetProcAddress
LoadLibraryA
WinExec
CreateMutexA
CreateThread
VirtualAlloc
GetLastError
GetSystemDirectoryA
GetModuleFileNameA
CreateProcessA
CloseHandle
GetWindowsDirectoryA
KillTimer
UnhookWindowsHookEx
CallNextHookEx
DispatchMessageA
SetTimer
CreateWindowExA
ShowWindow
FindWindowExA
PostMessageA
RegisterClassExA
GetMessageA
SetWindowsHookExA
DefWindowProcA
TranslateMessage
RegQueryValueExA
RegOpenKeyExA
RegSetValueExA
RegCreateKeyExA
RegCloseKey
fopen
_adjust_fdiv
malloc
_initterm
free
__CxxFrameHandler
atoi
_except_handler3
strchr
_stricmp
fwrite
fclose
sprintf
strrchr
??3@YAXPAX@Z
??2@YAPAXI@Z
SHGetValueA
HttpQueryInfoA
InternetOpenUrlA
InternetSetOptionA
InternetOpenA
InternetReadFile
InternetCloseHandle
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ