DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
090d858dce065e76267e788c2e923c9d_JaffaCakes118.dll
Resource
win7-20240611-en
Target
090d858dce065e76267e788c2e923c9d_JaffaCakes118
Size
64KB
MD5
090d858dce065e76267e788c2e923c9d
SHA1
cfecbcc8ea2eda5cc8f10ff0ae9d1b0351fcdded
SHA256
6a70befdb59c3dc81162fae00a3d0e0c4e1973754f3e9fd6a0e8e7ed1593861c
SHA512
183e2817c4822f6ac91895d83582083d41eed1aa3a4cb3fce20b27dc4954f43ed23bc3c491e036c6235a91ac942bc094468466ff3e55f485f4cd49447a7e2a5c
SSDEEP
768:05rxKGL9C8jyHOeGMOWVEjlcABRyMfRJ7Zda0h5TvJa+uBb7OSNC+3:AxVAHOeGVWVEcKb6oLJaDb7T5
Checks for missing Authenticode signature.
resource |
---|
090d858dce065e76267e788c2e923c9d_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
CloseHandle
Process32Next
Process32First
GetExitCodeProcess
WaitForSingleObject
CreateProcessA
GetSystemDirectoryA
Sleep
FreeLibrary
GetCurrentProcessId
CreateThread
EnterCriticalSection
GetPrivateProfileStringA
FindFirstFileA
WritePrivateProfileStringA
RemoveDirectoryA
DisableThreadLibraryCalls
InitializeCriticalSection
DeleteCriticalSection
InterlockedIncrement
InterlockedDecrement
HeapDestroy
GetShortPathNameA
GetModuleHandleA
LeaveCriticalSection
GetCommandLineW
CreateDirectoryA
LoadLibraryA
GetProcAddress
ExitProcess
GetModuleFileNameA
WideCharToMultiByte
lstrlenA
lstrlenW
LocalFree
MultiByteToWideChar
SetFileAttributesA
MoveFileA
DeleteFileA
FindNextFileA
RegQueryValueExA
RegCreateKeyExA
RegSetValueExA
GetNamedSecurityInfoA
BuildExplicitAccessWithNameA
SetEntriesInAclA
SetNamedSecurityInfoA
RegOpenKeyExA
RegQueryInfoKeyA
RegEnumKeyExA
RegDeleteKeyA
RegCloseKey
SHGetSpecialFolderPathA
CommandLineToArgvW
CoInitialize
CoGetInterfaceAndReleaseStream
CoMarshalInterThreadInterfaceInStream
CoUninitialize
CoCreateInstance
SysStringLen
LoadRegTypeLi
VariantClear
SysAllocString
SysFreeString
strcpy
_stricmp
_strupr
_adjust_fdiv
malloc
_initterm
free
_purecall
atoi
fopen
fseek
ftell
fread
fclose
strncmp
strchr
sprintf
strlen
??3@YAXPAX@Z
strstr
??2@YAPAXI@Z
memset
memcmp
memcpy
_access
strcat
_strlwr
strcmp
strrchr
wcsstr
_wcslwr
strncpy
SHDeleteValueA
SHSetValueA
SHDeleteKeyA
DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ