DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
fffa6d42363947c465a60c6da3e6ced7_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
fffa6d42363947c465a60c6da3e6ced7_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
fffa6d42363947c465a60c6da3e6ced7_JaffaCakes118
Size
44KB
MD5
fffa6d42363947c465a60c6da3e6ced7
SHA1
c962fd9cc749c18e76cda32583577cc1f8b94309
SHA256
29f79574327e1a7e70c27bef8b7a959a420415cb9315e28d89170ab0bac789c8
SHA512
a9aeb2fb860b5df6fc7c3beb0a6669534b2c244d77b156fdb1cf412fbb521ff08a99383faa3107d9d502dd737027acf556af22b9ad435b5309780d358d6cd5f0
SSDEEP
768:dNq4s3ASIlnHy+DCpkavOvIgLa10eEin:dA4s3fknLDRhJLa8Q
Checks for missing Authenticode signature.
resource |
---|
fffa6d42363947c465a60c6da3e6ced7_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetLastError
CreateMutexA
GetProcAddress
WinExec
GetWindowsDirectoryA
GetLocalTime
VirtualAlloc
CreateProcessA
LoadLibraryA
CreateThread
CloseHandle
InterlockedIncrement
GetModuleFileNameA
GetSystemDirectoryA
SetTimer
KillTimer
RegisterClassExA
ShowWindow
DefWindowProcA
FindWindowExA
PostMessageA
UnhookWindowsHookEx
GetMessageA
TranslateMessage
DispatchMessageA
SetWindowsHookExA
CallNextHookEx
CreateWindowExA
RegSetValueExA
RegCreateKeyExA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
fopen
_adjust_fdiv
malloc
_initterm
free
_pctype
_except_handler3
__CxxFrameHandler
strchr
_stricmp
fwrite
fclose
strrchr
sprintf
??3@YAXPAX@Z
??2@YAPAXI@Z
SHGetValueA
HttpQueryInfoA
InternetOpenUrlA
InternetSetOptionA
InternetOpenA
InternetReadFile
InternetCloseHandle
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ