DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
f34964290682e8547295762959d094e8_JaffaCakes118.dll
Resource
win7-20240221-en
Target
f34964290682e8547295762959d094e8_JaffaCakes118
Size
52KB
MD5
f34964290682e8547295762959d094e8
SHA1
8de6b318bd268d9948aea3df35d22ef0291c7cc3
SHA256
412859057e66c7d6bbfe5852c9f153a6d3585837fddb917686d2c445f7f8a7dd
SHA512
962b1991a100eac13c23ef50c4d620fc3d86e639fcf96d10a90cae2a22fbd9fc7441d46f46bf8c55dbf1fc757706a98bfa74cabf02e0bfac6c6b6f5b95a5c701
SSDEEP
1536:E/st31Mo6FohQGf9nU863qS55wmU8/zhT:dt3mn2QG2F6d8/VT
Checks for missing Authenticode signature.
resource |
---|
f34964290682e8547295762959d094e8_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
CloseHandle
CreateProcessA
GetSystemDirectoryA
LeaveCriticalSection
EnterCriticalSection
WideCharToMultiByte
lstrlenW
RemoveDirectoryA
WritePrivateProfileStringA
CreateDirectoryA
DisableThreadLibraryCalls
InitializeCriticalSection
DeleteCriticalSection
FreeLibrary
InterlockedDecrement
HeapDestroy
GetShortPathNameA
GetModuleHandleA
Process32Next
Process32First
CreateThread
GetExitCodeProcess
WaitForSingleObject
GetCurrentProcessId
FindFirstFileA
GetPrivateProfileStringA
FindNextFileA
GetModuleFileNameA
SetFileAttributesA
DeleteFileA
MoveFileA
lstrlenA
MultiByteToWideChar
LoadLibraryA
GetProcAddress
Sleep
ExitProcess
GetCommandLineW
LocalFree
InterlockedIncrement
RegEnumKeyExA
GetNamedSecurityInfoA
BuildExplicitAccessWithNameA
SetEntriesInAclA
SetNamedSecurityInfoA
RegCreateKeyExA
RegSetValueExA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
RegDeleteKeyA
RegQueryInfoKeyA
CommandLineToArgvW
SHGetSpecialFolderPathA
CoGetInterfaceAndReleaseStream
CoCreateInstance
CoMarshalInterThreadInterfaceInStream
CoInitialize
CoUninitialize
SysStringLen
LoadRegTypeLi
SysAllocString
VariantClear
SysFreeString
_wcslwr
_strupr
_strlwr
_adjust_fdiv
malloc
_initterm
free
strcmp
fopen
fseek
ftell
fread
fclose
memcmp
??2@YAPAXI@Z
_purecall
sprintf
atoi
strchr
??3@YAXPAX@Z
strncpy
memset
strncmp
strlen
strcpy
wcsstr
_stricmp
strstr
strrchr
strcat
_access
memcpy
SHSetValueA
SHDeleteKeyA
SHDeleteValueA
DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ