DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
0b303be968b6b5114994091c5c637426_JaffaCakes118.dll
Resource
win7-20240611-en
Target
0b303be968b6b5114994091c5c637426_JaffaCakes118
Size
72KB
MD5
0b303be968b6b5114994091c5c637426
SHA1
d27058ca4e41b0cb1fb65e5388626d27918a86ed
SHA256
c6e8298d74f81c29fdc9e1ee6c4266126324b2d42beb2950ac6bd49cf5155612
SHA512
386ac209cdce579fb19d68302bef23e772fe08c23892024158feededc17edf7c7dfee3e1da265c319d3a0e7784236fc0796e9874f5aefc4d5fe45ea610d03d03
SSDEEP
1536:QNFo9THZwGxADmHcaKvP1aRx9QdUCIHhBHWR3DA:QNFoTHZqqHjKv8iUC8hBHeA
Checks for missing Authenticode signature.
resource |
---|
0b303be968b6b5114994091c5c637426_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
EnterCriticalSection
SetFileAttributesA
CreateThread
WritePrivateProfileStringA
CreateProcessA
GetSystemDirectoryA
GetProcAddress
LoadLibraryA
GetExitCodeProcess
WaitForSingleObject
FreeLibrary
Process32Next
Process32First
LeaveCriticalSection
CreateDirectoryA
MoveFileA
DisableThreadLibraryCalls
InitializeCriticalSection
DeleteCriticalSection
InterlockedIncrement
InterlockedDecrement
HeapDestroy
GetShortPathNameA
GetModuleHandleA
RemoveDirectoryA
GetCurrentProcessId
CloseHandle
LocalFree
FindFirstFileA
GetPrivateProfileStringA
DeleteFileA
FindNextFileA
GetCommandLineW
GetModuleFileNameA
WideCharToMultiByte
lstrlenA
MultiByteToWideChar
ExitProcess
lstrlenW
Sleep
RegQueryValueExA
RegCreateKeyExA
RegSetValueExA
BuildExplicitAccessWithNameA
SetEntriesInAclA
GetNamedSecurityInfoA
SetNamedSecurityInfoA
RegEnumKeyExA
RegDeleteKeyA
RegCloseKey
RegOpenKeyExA
RegQueryInfoKeyA
CommandLineToArgvW
SHGetSpecialFolderPathA
CoMarshalInterThreadInterfaceInStream
CoGetInterfaceAndReleaseStream
CoInitialize
CoUninitialize
CoCreateInstance
SysStringLen
LoadRegTypeLi
VariantClear
SysAllocString
SysFreeString
wcsstr
_stricmp
_strlwr
_adjust_fdiv
malloc
_initterm
free
_purecall
_access
strncmp
strncpy
strcmp
fopen
fseek
ftell
fread
strstr
memcmp
memcpy
??3@YAXPAX@Z
strrchr
sprintf
strlen
memset
strcat
strcpy
_strupr
_wcslwr
atoi
strchr
??2@YAPAXI@Z
fclose
SHDeleteValueA
SHDeleteKeyA
SHSetValueA
DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ