DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
06a784e353b2788656c1542a5c86b3e7_JaffaCakes118.dll
Resource
win7-20240220-en
Target
06a784e353b2788656c1542a5c86b3e7_JaffaCakes118
Size
72KB
MD5
06a784e353b2788656c1542a5c86b3e7
SHA1
281bac356e4544c418db392a058d3158e353dce4
SHA256
b6f2e817dfe14532c76139064ca18c1e53443d3b8e08211731a7f8fe21055317
SHA512
3466ef44b4824f51cfe36e0a93c32b00f388761eb6273b54393503bb7b941ed21bc1c9042cb095c5d47b8cb45cb4e13a1aafdb3ae2dfada62f512427262b9372
SSDEEP
1536:mM5nPsXbYgJTdo94Rqm457i/jFyCl6khFZSUf:X03SGjFplVfSUf
Checks for missing Authenticode signature.
resource |
---|
06a784e353b2788656c1542a5c86b3e7_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Sleep
LeaveCriticalSection
EnterCriticalSection
FindNextFileA
GetPrivateProfileStringA
FindFirstFileA
CreateDirectoryA
GetCurrentProcessId
ExitProcess
GetExitCodeProcess
WaitForSingleObject
GetCommandLineW
Process32Next
Process32First
DisableThreadLibraryCalls
InitializeCriticalSection
DeleteCriticalSection
InterlockedIncrement
InterlockedDecrement
HeapDestroy
GetShortPathNameA
GetModuleHandleA
CreateThread
WritePrivateProfileStringA
SetFileAttributesA
DeleteFileA
MoveFileA
GetSystemDirectoryA
CreateProcessA
CloseHandle
GetProcAddress
LoadLibraryA
FreeLibrary
LocalFree
GetModuleFileNameA
WideCharToMultiByte
lstrlenA
MultiByteToWideChar
lstrlenW
RemoveDirectoryA
RegEnumKeyExA
RegSetValueExA
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
RegQueryInfoKeyA
GetNamedSecurityInfoA
BuildExplicitAccessWithNameA
SetEntriesInAclA
SetNamedSecurityInfoA
RegDeleteKeyA
RegCreateKeyExA
SHGetSpecialFolderPathA
CommandLineToArgvW
CoInitialize
CoGetInterfaceAndReleaseStream
CoMarshalInterThreadInterfaceInStream
CoUninitialize
CoCreateInstance
SysStringLen
LoadRegTypeLi
VariantClear
SysAllocString
SysFreeString
strstr
_stricmp
_strlwr
_adjust_fdiv
malloc
_initterm
free
_purecall
_wcslwr
wcsstr
strcmp
fopen
fseek
ftell
??2@YAPAXI@Z
fread
??3@YAXPAX@Z
memcmp
memcpy
memset
sprintf
strlen
strncpy
strchr
strncmp
strcpy
_strupr
atoi
strrchr
_access
strcat
fclose
SHSetValueA
SHDeleteKeyA
SHDeleteValueA
DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ