DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
04bb013a1edbd09eb9195a357bef40f2_JaffaCakes118.dll
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
04bb013a1edbd09eb9195a357bef40f2_JaffaCakes118.dll
Resource
win10v2004-20240508-en
Target
04bb013a1edbd09eb9195a357bef40f2_JaffaCakes118
Size
80KB
MD5
04bb013a1edbd09eb9195a357bef40f2
SHA1
43f7d9d03fdbd4a45f87b8978e0855c6a0624cea
SHA256
17ab7aaa2f27125c2e4863702369d2ecc8f300ab194cac0a48fa9997dc8b709b
SHA512
0baa802bc196b3b4161c709c1cb096acddf62ca7ba589938f8418910fbf70b814c52399031b245786df8c5b45eaf73973a2c2ccb68956e2f95677e1f46442fb5
SSDEEP
1536:b8jfDwtn2OGECnSlfsL9gNvlxKYPBFYC9TqE8+U846q:GDwtw7JgNLRdqq46q
Checks for missing Authenticode signature.
resource |
---|
04bb013a1edbd09eb9195a357bef40f2_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetExitCodeProcess
WaitForSingleObject
CreateProcessA
GetSystemDirectoryA
GetProcAddress
LoadLibraryA
RemoveDirectoryA
DeleteFileA
CreateThread
MoveFileA
SetFileAttributesA
FreeLibrary
FindNextFileA
Sleep
FindFirstFileA
LocalFree
ExitProcess
Process32Next
Process32First
GetCurrentProcessId
GetCommandLineW
CreateDirectoryA
WideCharToMultiByte
CloseHandle
GetModuleHandleA
GetShortPathNameA
lstrlenA
MultiByteToWideChar
lstrlenW
HeapDestroy
InterlockedDecrement
EnterCriticalSection
InterlockedIncrement
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
DisableThreadLibraryCalls
GetModuleFileNameA
WritePrivateProfileStringA
GetPrivateProfileStringA
GetNamedSecurityInfoA
RegDeleteKeyA
BuildExplicitAccessWithNameA
SetEntriesInAclA
SetNamedSecurityInfoA
RegEnumKeyExA
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
RegQueryInfoKeyA
RegCreateKeyExA
RegSetValueExA
SHGetSpecialFolderPathA
CommandLineToArgvW
CoMarshalInterThreadInterfaceInStream
CoUninitialize
CoGetInterfaceAndReleaseStream
CoInitialize
CoCreateInstance
SysAllocString
VariantClear
SysStringLen
LoadRegTypeLi
SysFreeString
strcpy
_stricmp
_strlwr
_adjust_fdiv
malloc
_initterm
free
atoi
fopen
fseek
ftell
fread
fclose
_wcslwr
wcsstr
strcmp
strstr
memset
strlen
sprintf
memcpy
_purecall
??3@YAXPAX@Z
??2@YAPAXI@Z
memcmp
strcat
_strupr
strncpy
strchr
strncmp
_access
strrchr
SHDeleteValueA
SHDeleteKeyA
SHSetValueA
DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ