DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
53dab54bb747b79701c076d3efeebbe4_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
53dab54bb747b79701c076d3efeebbe4_JaffaCakes118.dll
Resource
win10v2004-20241007-en
Target
53dab54bb747b79701c076d3efeebbe4_JaffaCakes118
Size
32KB
MD5
53dab54bb747b79701c076d3efeebbe4
SHA1
4e9ea7babab5bbc264773dd457059d6f509618ad
SHA256
1be7b7fb49dee555984c922eb68a0a25ce5efab3807e31773640f766d962849a
SHA512
6dc75ede5c3b7330b8e182618385fdb147db4b0cfa0bfcd2ad2f83577b0b846714113ce348e76d1dc5236ad1b5d72ed59a14e5a6a4f629f454f53eb06f03cbf0
SSDEEP
384:ZsRXStWSG2uBBQARQkENDg+U1gflL9hy5V0m3:ZAvBBBQARQkENDuKljyQm
Checks for missing Authenticode signature.
resource |
---|
53dab54bb747b79701c076d3efeebbe4_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IsBadStringPtrA
lstrcatA
WinExec
GetModuleFileNameA
SetEvent
OpenEventA
CreateEventA
TerminateProcess
GetCurrentProcess
CreateThread
LoadLibraryA
InitializeCriticalSection
DeleteCriticalSection
LeaveCriticalSection
InterlockedIncrement
EnterCriticalSection
InterlockedDecrement
lstrlenW
GetModuleHandleA
GlobalAlloc
GlobalLock
GetCurrentProcessId
OpenProcess
ReadProcessMemory
CloseHandle
IsBadReadPtr
VirtualProtect
Sleep
ExitProcess
lstrlenA
GetCurrentDirectoryA
DisableThreadLibraryCalls
KillTimer
GetWindowTextA
SetTimer
GetForegroundWindow
wsprintfA
CallNextHookEx
SetWindowsHookExA
RegCloseKey
RegOpenKeyA
RegSetValueExA
LoadRegTypeLi
SysFreeString
SysStringLen
ord21
ord16
ord15
ord18
ord57
ord32
ord58
ord30
ord23
InternetOpenUrlA
InternetOpenA
InternetCloseHandle
InternetReadFile
fopen
_strlwr
_adjust_fdiv
malloc
_initterm
free
??2@YAPAXI@Z
_purecall
isprint
strstr
memcpy
strrchr
strlen
strcpy
memset
fclose
fread
fputs
_strcmpi
strcat
exit
memcmp
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ