DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
f6ff6b12e99bba6ab626d47c5ccd5012_JaffaCakes118.dll
Resource
win7-20240221-en
Target
f6ff6b12e99bba6ab626d47c5ccd5012_JaffaCakes118
Size
60KB
MD5
f6ff6b12e99bba6ab626d47c5ccd5012
SHA1
f430e5a9ab3d37a4b800f9d4b3a483bd19f6cda0
SHA256
67babb2ff5241ed4de12f4600c92c55108a23b4bb85a99325b59aff4db07f3c8
SHA512
167b1ffda6a63ad3921e847eb7fc5b3f99f659ee4a4e4f23cd1d1704a8fd6fd8ff08af452c0b73f16cfd6d74b29bd74dad6041eec3e06c3480f83f8eabbe078d
SSDEEP
1536:lxrbEmc/skJUk27jCsASQYt+ipnChtubHtG48ga0jS8:lpEX5JzOjCuQGv8gu8
Checks for missing Authenticode signature.
resource |
---|
f6ff6b12e99bba6ab626d47c5ccd5012_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
CloseHandle
WaitForSingleObject
GetSystemDirectoryA
GetProcAddress
LoadLibraryA
DisableThreadLibraryCalls
InitializeCriticalSection
DeleteCriticalSection
LeaveCriticalSection
InterlockedIncrement
EnterCriticalSection
InterlockedDecrement
HeapDestroy
GetExitCodeProcess
GetModuleHandleA
WritePrivateProfileStringA
GetCurrentProcessId
Process32Next
Process32First
GetCommandLineW
Sleep
FreeLibrary
ExitProcess
MoveFileA
CreateDirectoryA
CreateProcessA
LocalFree
FindFirstFileA
GetPrivateProfileStringA
SetFileAttributesA
DeleteFileA
FindNextFileA
GetModuleFileNameA
WideCharToMultiByte
lstrlenA
MultiByteToWideChar
lstrlenW
CreateThread
GetShortPathNameA
GetNamedSecurityInfoA
SetNamedSecurityInfoA
RegCreateKeyExA
RegSetValueExA
RegQueryValueExA
RegDeleteKeyA
RegOpenKeyExA
RegQueryInfoKeyA
RegEnumKeyExA
RegCloseKey
BuildExplicitAccessWithNameA
SetEntriesInAclA
SHGetSpecialFolderPathA
CommandLineToArgvW
CoCreateInstance
CoUninitialize
CoGetInterfaceAndReleaseStream
CoInitialize
CoMarshalInterThreadInterfaceInStream
VariantClear
SysStringLen
LoadRegTypeLi
SysAllocString
SysFreeString
strcpy
_strlwr
_strupr
_adjust_fdiv
malloc
_initterm
free
_access
strcmp
strncmp
strncpy
_purecall
fopen
fseek
ftell
??2@YAPAXI@Z
??3@YAXPAX@Z
memcmp
memcpy
strstr
memset
strrchr
sprintf
strcat
wcsstr
_wcslwr
_stricmp
strlen
atoi
strchr
fclose
fread
SHSetValueA
SHDeleteValueA
SHDeleteKeyA
DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ