DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
eaef0db441097deaaec2ed89e761d469_JaffaCakes118.dll
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
eaef0db441097deaaec2ed89e761d469_JaffaCakes118.dll
Resource
win10v2004-20240226-en
Target
eaef0db441097deaaec2ed89e761d469_JaffaCakes118
Size
48KB
MD5
eaef0db441097deaaec2ed89e761d469
SHA1
9ddb335052e005a04887bc538bcf88964931c898
SHA256
4fff6b52973de13110efd41c4bf75fceb13fb387ad0620ee248df7a812d37f63
SHA512
5924c9ff1cbb9a5c939c63fbe79ffbb66d12aceb1c084f33c581e5a974efc89469d95b06de79fb9c7817620c0e02d036e1579c3aac632c67fda883bfc4d7814c
SSDEEP
768:lQSGxvX2PbKq0UotCcSHoqMl77+YbvNgwTUEhpvZSCWbFZ0As:luX2PbKqVoquFpgwTUEhNyFr
Checks for missing Authenticode signature.
resource |
---|
eaef0db441097deaaec2ed89e761d469_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetLastError
CreateEventA
MoveFileA
DeleteFileA
SetFileAttributesA
MultiByteToWideChar
FindNextFileA
FindFirstFileA
GetSystemDirectoryA
Process32Next
Process32First
CreateThread
Sleep
WideCharToMultiByte
lstrlenW
InterlockedIncrement
GetWindowsDirectoryA
FreeLibrary
LeaveCriticalSection
EnterCriticalSection
DisableThreadLibraryCalls
InitializeCriticalSection
DeleteCriticalSection
InterlockedDecrement
HeapAlloc
GetSystemInfo
GetVersionExA
HeapCreate
HeapDestroy
GetShortPathNameA
GetModuleHandleA
GetModuleFileNameA
WritePrivateProfileStringA
CloseHandle
GetLocalTime
LoadLibraryA
GetProcAddress
GetCommandLineW
lstrlenA
GetCurrentProcessId
DefWindowProcA
CreateWindowExA
ShowWindow
SetWindowTextA
SendMessageA
RegisterClassExA
IsWindow
FindWindowExA
TranslateMessage
DispatchMessageA
CallNextHookEx
KillTimer
SetTimer
PostMessageA
GetMessageA
RegQueryValueExA
RegOpenKeyExA
RegSetValueExA
RegCreateKeyExA
RegCloseKey
CommandLineToArgvW
CoInitialize
CoCreateInstance
SysStringLen
LoadRegTypeLi
SysAllocString
VariantClear
SysFreeString
_strlwr
_purecall
rand
memcpy
strchr
fopen
fwrite
free
_initterm
malloc
_adjust_fdiv
_stricmp
memcmp
fclose
strcmp
memset
??2@YAPAXI@Z
strrchr
strcat
sprintf
strcpy
_access
strstr
strlen
??3@YAXPAX@Z
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ