DllGetPPSObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
efa24a32d7a8d8f87d5c42f1b90e5f2a_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
efa24a32d7a8d8f87d5c42f1b90e5f2a_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
efa24a32d7a8d8f87d5c42f1b90e5f2a_JaffaCakes118
Size
28KB
MD5
efa24a32d7a8d8f87d5c42f1b90e5f2a
SHA1
f8e594787fe1d315645747eb0ef924d0204970fa
SHA256
c2d84fbe1833e06df2053769729414fe3e2dccdc9f14c986cb4ba8e49bca5524
SHA512
3a8d7fffcd19c6b853e7f90253fa2ff1c92a8a3302ce0bfabaafdf3fb0559c8c8d9bb68d09e117a955a299022bfc29a26f7f0edce39bfd6f360fe0bd30fb7908
SSDEEP
192:qCGB89ozRZ05Y2UiC4LXgMFZl9+qQ/1/wzJvZvdW9+2Cp92xR4CAaBeM5Qrm7t8K:e8kEJpCQQMt9+qQ/1/ZMMBeMV8MrEW
Checks for missing Authenticode signature.
resource |
---|
efa24a32d7a8d8f87d5c42f1b90e5f2a_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
ord860
ord537
ord1176
ord6877
ord5683
ord6467
ord1578
ord600
ord826
ord3181
ord535
ord1980
ord2781
ord4058
ord3178
ord2915
ord2818
ord356
ord2770
ord668
ord540
ord2919
ord5572
ord269
ord4129
ord858
ord800
ord1243
ord924
_adjust_fdiv
??3@YAXPAX@Z
free
fclose
memchr
??1type_info@@UAE@XZ
malloc
memmove
__CxxFrameHandler
sprintf
_initterm
__dllonexit
_onexit
LocalFree
DisableThreadLibraryCalls
OpenMutexA
lstrcpyA
LoadLibraryA
FreeLibrary
GetEnvironmentVariableA
WritePrivateProfileStringA
DeleteFileA
WinExec
GetModuleFileNameA
GetProcAddress
ExitProcess
LocalAlloc
MessageBoxA
wsprintfA
RegOpenKeyExA
RegCloseKey
RegQueryValueExA
RegSetValueExA
??_8?$basic_ofstream@DU?$char_traits@D@std@@@std@@7B@
??0ios_base@std@@IAE@XZ
??_D?$basic_ofstream@DU?$char_traits@D@std@@@std@@QAEXXZ
??1?$basic_ostream@DU?$char_traits@D@std@@@std@@UAE@XZ
??1?$basic_ios@DU?$char_traits@D@std@@@std@@UAE@XZ
??1ios_base@std@@UAE@XZ
??1?$basic_filebuf@DU?$char_traits@D@std@@@std@@UAE@XZ
?write@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV12@PBDH@Z
?_Initcvt@?$basic_filebuf@DU?$char_traits@D@std@@@std@@IAEXXZ
?_Init@?$basic_filebuf@DU?$char_traits@D@std@@@std@@IAEXPAU_iobuf@@W4_Initfl@12@@Z
?__Fiopen@std@@YAPAU_iobuf@@PBDH@Z
?clear@ios_base@std@@QAEXH_N@Z
??_7?$basic_ofstream@DU?$char_traits@D@std@@@std@@6B@
??0?$basic_filebuf@DU?$char_traits@D@std@@@std@@QAE@PAU_iobuf@@@Z
?init@?$basic_ios@DU?$char_traits@D@std@@@std@@IAEXPAV?$basic_streambuf@DU?$char_traits@D@std@@@2@_N@Z
??_7?$basic_ostream@DU?$char_traits@D@std@@@std@@6B@
??_7?$basic_ios@DU?$char_traits@D@std@@@std@@6B@
WSAStartup
gethostbyname
htons
socket
connect
recv
closesocket
WSACleanup
send
DllGetPPSObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ