DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
0d5ac52374809221a141e5206009c3d7_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
0d5ac52374809221a141e5206009c3d7_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
0d5ac52374809221a141e5206009c3d7_JaffaCakes118
Size
44KB
MD5
0d5ac52374809221a141e5206009c3d7
SHA1
4e70224b7afef0f9cecbe7c83b0ffba29d39827c
SHA256
062d0970c200785073f8311ee2c16811fd7507c982ea38d59b4502a292f5ee3e
SHA512
38dad3429609550edd957836deab69e1fab9e709fbaf9987b6bfe1d2a47104376f8bfc82ca43c1260e424095fa6625ce3cf3557a1581e9186770d42f43e17f25
SSDEEP
768:7tkxVSz6pHpkavbfeASkSSk8rrfjszQhrgLa1:hpWeAz5k8r/skWLa
Checks for missing Authenticode signature.
resource |
---|
0d5ac52374809221a141e5206009c3d7_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetLastError
CreateMutexA
CreateProcessA
GetSystemDirectoryA
GetModuleFileNameA
GetLocalTime
WinExec
GetWindowsDirectoryA
InterlockedIncrement
LoadLibraryA
GetProcAddress
VirtualAlloc
CreateThread
CloseHandle
FindWindowExA
SetTimer
KillTimer
RegisterClassExA
PostMessageA
CallNextHookEx
GetMessageA
TranslateMessage
DispatchMessageA
SetWindowsHookExA
CreateWindowExA
UnhookWindowsHookEx
DefWindowProcA
ShowWindow
RegSetValueExA
RegCreateKeyExA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
fclose
_adjust_fdiv
malloc
_initterm
free
strrchr
strchr
fopen
fwrite
_stricmp
??2@YAPAXI@Z
??3@YAXPAX@Z
_except_handler3
sprintf
__CxxFrameHandler
atoi
SHGetValueA
HttpQueryInfoA
InternetOpenUrlA
InternetSetOptionA
InternetOpenA
InternetReadFile
InternetCloseHandle
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ