DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
febd3a7611d4e42e6d4a3e5ca1f78c8e_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
febd3a7611d4e42e6d4a3e5ca1f78c8e_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
febd3a7611d4e42e6d4a3e5ca1f78c8e_JaffaCakes118
Size
44KB
MD5
febd3a7611d4e42e6d4a3e5ca1f78c8e
SHA1
cc23b1be8914ba8694db797c22105168b2c9fe31
SHA256
4df0a4e1d8da699b9df24fe5b4f1870ab22f93024bd4d4cf2563682b46adf409
SHA512
990e530cdd7f1f234426f0cc60ef7bb3e5d08ba1000759bd0c3ab4f0bf1ea19b385143fb9e8d6b9fb6eef2b300859b95c0bb4a32578373f11ba8bd31913b3d3a
SSDEEP
768:CD1il2EVqpkavvzy7kUN9c+dlZFlgLa1o:21i8EV5Oe9Nq+LjSLay
Checks for missing Authenticode signature.
resource |
---|
febd3a7611d4e42e6d4a3e5ca1f78c8e_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
CreateThread
LoadLibraryA
WinExec
GetWindowsDirectoryA
VirtualAlloc
GetSystemDirectoryA
GetLocalTime
InterlockedIncrement
GetModuleFileNameA
CreateProcessA
CreateMutexA
GetLastError
CloseHandle
GetProcAddress
RegisterClassExA
UnhookWindowsHookEx
ShowWindow
CreateWindowExA
PostMessageA
FindWindowExA
KillTimer
SetTimer
DefWindowProcA
CallNextHookEx
SetWindowsHookExA
GetMessageA
TranslateMessage
DispatchMessageA
RegSetValueExA
RegCreateKeyExA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
SHGetValueA
fclose
_adjust_fdiv
malloc
_initterm
free
strrchr
atoi
_except_handler3
strchr
fopen
fwrite
_stricmp
??3@YAXPAX@Z
??2@YAPAXI@Z
sprintf
__CxxFrameHandler
HttpQueryInfoA
InternetOpenUrlA
InternetSetOptionA
InternetOpenA
InternetReadFile
InternetCloseHandle
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ