DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
098e6c724a125c09ef39714724f5c1f2_JaffaCakes118.dll
Resource
win7-20240221-en
Target
098e6c724a125c09ef39714724f5c1f2_JaffaCakes118
Size
80KB
MD5
098e6c724a125c09ef39714724f5c1f2
SHA1
7b9c7869244e849fc99dbd9680265bcfe39ab79d
SHA256
140887b69215e1ddb586e9bd3ae6ddf973d5b053910626b9afdd457da2ad3e6c
SHA512
67edbc82e8ffd477bdb09b598a4cffb00c916dcfe5dd240cdc22e6ba920a3c5797bd4008f4a14a9aa2a048905510b9ab48ba0a78d6801048a460698892db9e18
SSDEEP
1536:n2u7RN3Fy03gw9gBL2BMGzEGH98qlWTmXBD0:2OFjD9lBcGd8AgmXBD0
Checks for missing Authenticode signature.
resource |
---|
098e6c724a125c09ef39714724f5c1f2_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
LeaveCriticalSection
InterlockedIncrement
EnterCriticalSection
InterlockedDecrement
HeapDestroy
lstrlenW
GetShortPathNameA
GetModuleHandleA
GetModuleFileNameA
Sleep
GetProcAddress
DeleteCriticalSection
GetCurrentProcessId
GetCommandLineW
FindNextFileA
GetPrivateProfileStringA
FindFirstFileA
GetSystemDirectoryA
GetExitCodeProcess
WaitForSingleObject
LocalFree
CreateDirectoryA
InitializeCriticalSection
DisableThreadLibraryCalls
WritePrivateProfileStringA
RemoveDirectoryA
CreateProcessA
ExitProcess
lstrlenA
CreateThread
LoadLibraryA
FreeLibrary
MultiByteToWideChar
SetFileAttributesA
DeleteFileA
MoveFileA
Process32First
CloseHandle
Process32Next
WideCharToMultiByte
SetNamedSecurityInfoA
GetNamedSecurityInfoA
RegQueryValueExA
RegCreateKeyExA
RegSetValueExA
RegOpenKeyExA
RegQueryInfoKeyA
RegEnumKeyExA
RegDeleteKeyA
RegCloseKey
BuildExplicitAccessWithNameA
SetEntriesInAclA
SHGetSpecialFolderPathA
CommandLineToArgvW
CoInitialize
CoUninitialize
CoGetInterfaceAndReleaseStream
CoMarshalInterThreadInterfaceInStream
CoCreateInstance
SysStringLen
LoadRegTypeLi
SysAllocString
VariantClear
SysFreeString
_access
_stricmp
_strupr
_adjust_fdiv
malloc
_initterm
free
strcmp
strncmp
strncpy
strrchr
fopen
fseek
ftell
fread
fclose
sprintf
??3@YAXPAX@Z
strstr
??2@YAPAXI@Z
strcpy
strlen
atoi
strchr
strcat
memset
_strlwr
wcsstr
_wcslwr
memcpy
_purecall
memcmp
SHSetValueA
SHDeleteKeyA
SHDeleteValueA
DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ