DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
dd2e33dfe90008813ca73ed095b690da_JaffaCakes118.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
dd2e33dfe90008813ca73ed095b690da_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
dd2e33dfe90008813ca73ed095b690da_JaffaCakes118
Size
36KB
MD5
dd2e33dfe90008813ca73ed095b690da
SHA1
4cac74e1915d662174b02fe51aadf26963cddfd3
SHA256
3a8aaea89c22b8d0dfc3c7fbe18f1a1138df0e9460852574beaa09db8c5e8070
SHA512
ae7f1e988dc8bb78d74b06893b0cb18bb37dcdcadf6eb64078d0fc38c164e191ab2914038e4a44169ce7f16939e83eafa9d1e76eeedb588dd69ed66183ad6bb9
SSDEEP
384:yLVKUnuakHKFATECPvT06SCqP7ISJxI1cgQddI6H7qb0XDItyn4Q:yZK6uDHKFAR0nzjWcgQddI6qbe4y4Q
Checks for missing Authenticode signature.
resource |
---|
dd2e33dfe90008813ca73ed095b690da_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
socket
htons
ioctlsocket
gethostbyname
closesocket
recv
connect
LocalFree
GetProcAddress
LoadLibraryA
GetLastError
GetSystemInfo
IsBadReadPtr
VirtualQuery
IsBadStringPtrA
WideCharToMultiByte
MultiByteToWideChar
Sleep
GetTickCount
InterlockedDecrement
CloseHandle
CreateThread
GetModuleHandleA
CreateFileA
MapViewOfFile
CreateFileMappingA
OpenFileMappingA
ExitProcess
GetModuleFileNameA
CallNextHookEx
InternetCrackUrlA
CoInitializeEx
CoCreateInstance
OleRun
SysFreeString
SysAllocString
VariantClear
GetErrorInfo
??1type_info@@UAE@XZ
_CxxThrowException
_adjust_fdiv
_initterm
_onexit
__dllonexit
ftell
fclose
fopen
fgets
fseek
malloc
__CxxFrameHandler
wcslen
??2@YAPAXI@Z
sprintf
??3@YAXPAX@Z
free
_strdup
realloc
calloc
atoi
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ