CheckDefault
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
SetDefault
Static task
static1
Behavioral task
behavioral1
Sample
091997cfcbff5f50a9708d29579df045_JaffaCakes118.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
091997cfcbff5f50a9708d29579df045_JaffaCakes118.dll
Resource
win10v2004-20240508-en
Target
091997cfcbff5f50a9708d29579df045_JaffaCakes118
Size
60KB
MD5
091997cfcbff5f50a9708d29579df045
SHA1
98dc0698d05cd72907723f6ea13a025dba0b948b
SHA256
d6c5e0df90b926f1c6ec12f70b978b71f9638414363f558878b7d81510f807b7
SHA512
1d0e555ce2f8ed075c523298df21dcdbe0ce2e2167e055f031a37de1e378712e5f9b8f2691afebbf739175fc759a94d59ed7b48e81e21d4fb8967e88c0af0243
SSDEEP
768:/kZOGyDWtOaMoKLLbTywX8Ub0dTD88q5fU3wtpWNl9lecCOkfliQx:YtOaMhDF/ew8qlrpWNbMDvi8
Checks for missing Authenticode signature.
resource |
---|
091997cfcbff5f50a9708d29579df045_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
SHSetValueA
PathCombineA
PathFileExistsA
SHGetValueA
SHRegGetPathA
PathAppendA
SHEnumKeyExA
SHDeleteKeyA
SHCopyKeyA
PathRemoveFileSpecA
PathFindFileNameA
ord1775
ord4407
ord5241
ord2385
ord5163
ord6374
ord4353
ord5280
ord3798
ord4837
ord4441
ord2648
ord2055
ord6376
ord3749
ord5065
ord1727
ord5261
ord2446
ord2124
ord5277
ord2982
ord3147
ord3259
ord4465
ord3136
ord3262
ord2985
ord3081
ord2976
ord3830
ord3831
ord3825
ord3079
ord4080
ord4627
ord4425
ord3597
ord800
ord795
ord609
ord641
ord860
ord540
ord324
ord2302
ord4234
ord6197
ord6380
ord3092
ord6199
ord4710
ord4853
ord4376
ord825
ord6055
ord1776
ord5290
ord4078
ord4424
ord3721
ord567
ord2575
ord4396
ord3574
ord2727
ord6467
ord2730
ord2729
ord1799
ord446
ord743
ord4622
ord614
ord290
ord4226
ord4003
ord1113
ord3258
ord823
ord1168
ord4274
ord6375
ord4486
ord2554
ord2512
ord5731
ord6052
ord1089
ord5199
ord2396
ord3346
ord5300
ord5302
ord2725
ord4079
ord4698
ord5307
ord5289
ord5714
ord3953
ord3738
ord815
ord5500
ord561
ord1132
ord1131
ord6354
ord861
ord539
ord537
ord941
ord858
ord535
ord2514
ord4998
ord269
ord826
ord600
ord1578
ord1255
ord5265
ord1253
ord1570
ord1197
ord1243
ord342
ord1182
ord1577
ord1575
ord1176
ord1116
ord3402
ord3922
strcat
wcscmp
strlen
memset
__CxxFrameHandler
_strnicmp
_stricmp
strstr
__dllonexit
_onexit
free
_initterm
malloc
_adjust_fdiv
??1type_info@@UAE@XZ
strcpy
lstrcatA
lstrcmpiA
GetSystemDirectoryA
GetModuleFileNameA
GetProcAddress
LoadLibraryA
LocalFree
LocalAlloc
GetModuleHandleA
FreeLibrary
GetVersionExA
MultiByteToWideChar
LoadIconA
SendMessageA
MessageBoxA
SetForegroundWindow
EnableWindow
RegCreateKeyExA
RegCloseKey
RegOpenKeyExA
ShellExecuteA
CLSIDFromString
StringFromCLSID
CoTaskMemFree
ProgIDFromCLSID
SysAllocStringLen
SysFreeString
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBDABV?$allocator@D@1@@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV?$allocator@D@1@@Z
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@PBD@Z
?c_str@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEPBDXZ
??Y?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@PBD@Z
??Y?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@ABV01@@Z
??Ostd@@YA_NABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@0@Z
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@ABV01@@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
CheckDefault
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
SetDefault
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ