IsRunning
Start
StartByHostEx
Stop
Static task
static1
Behavioral task
behavioral1
Sample
3bf74821a90eb01a852fee084fd07314_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3bf74821a90eb01a852fee084fd07314_JaffaCakes118.dll
Resource
win10v2004-20241007-en
Target
3bf74821a90eb01a852fee084fd07314_JaffaCakes118
Size
60KB
MD5
3bf74821a90eb01a852fee084fd07314
SHA1
82e1efbfc11ba2d6e5a486987a68fc27de74e1dc
SHA256
0a3986a9ff2cae2b91ca44cbc42cc451ac027f7c37b79c53039f27c878a333c4
SHA512
08442b9dceb4954bf6071af9021e953e0c2c3c3ccab29edfec20a882a70b1278239f1dde974183ddfcccfd7834c3396fd79ef31411a25f62ac6bc5959784355a
SSDEEP
1536:H2/wMw66s/IEg5dNOrElCWXG9T9EguJRtFsWx:2w6gHPNOrf79EVJRtFP
Checks for missing Authenticode signature.
resource |
---|
3bf74821a90eb01a852fee084fd07314_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
InternetOpenUrlA
InternetGetConnectedState
InternetCloseHandle
HttpQueryInfoA
InternetOpenA
InternetReadFile
ord6394
ord2107
ord700
ord913
ord5594
ord398
ord4189
ord6930
ord1168
ord1253
ord342
ord1182
ord665
ord6383
ord354
ord1158
ord5683
ord5572
ord2915
ord603
ord1969
ord5819
ord273
ord668
ord1980
ord3185
ord3178
ord2781
ord2770
ord356
ord3789
ord5440
ord5450
ord2841
ord3663
ord3810
ord3227
ord3054
ord3425
ord3880
ord4277
ord6779
ord940
ord941
ord5710
ord939
ord535
ord4202
ord6877
ord2764
ord860
ord6282
ord6283
ord858
ord2818
ord4129
ord540
ord1228
ord823
ord389
ord3229
ord6059
ord5204
ord1075
ord5808
ord5356
ord2393
ord1247
ord1105
ord825
ord800
ord537
ord3790
_adjust_fdiv
_initterm
??1type_info@@UAE@XZ
_onexit
__dllonexit
rename
atoi
strrchr
__CxxFrameHandler
_strlwr
memmove
sprintf
strncpy
_snprintf
_stricmp
strchr
malloc
free
atol
strncat
GetProcAddress
LoadLibraryA
GetCurrentThreadId
DeleteFileA
WinExec
Sleep
GetModuleFileNameA
lstrlenA
GetVersionExA
CopyFileA
CreateDirectoryA
CloseHandle
FreeLibrary
GetModuleHandleA
GetComputerNameA
DeviceIoControl
CreateFileA
GlobalFree
GlobalAlloc
InterlockedIncrement
Process32Next
Process32First
CreateToolhelp32Snapshot
GetPrivateProfileStringA
GetTempPathA
GetSystemDirectoryA
MultiByteToWideChar
SetPropA
GetPropA
SendMessageTimeoutA
RegisterWindowMessageA
IsWindow
KillTimer
DispatchMessageA
TranslateMessage
GetMessageA
SetTimer
EnumChildWindows
RemovePropA
PostMessageA
FindWindowExA
DefWindowProcA
ShowWindow
CreateWindowExA
RegisterClassExA
WindowFromPoint
GetActiveWindow
GetFocus
SetWindowsHookExA
SendMessageA
GetClassNameA
GetParent
UnhookWindowsHookEx
CallNextHookEx
PostThreadMessageA
RegOpenKeyA
RegDeleteValueA
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
CoCreateInstance
SysAllocStringLen
SysFreeString
gethostbyname
inet_addr
GetFileVersionInfoA
VerQueryValueA
GetFileVersionInfoSizeA
PathFindFileNameA
Netbios
IsRunning
Start
StartByHostEx
Stop
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ