DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
0d4aecf1106a5499bff980dbc1e9d0c6_JaffaCakes118.dll
Resource
win7-20240508-en
Target
0d4aecf1106a5499bff980dbc1e9d0c6_JaffaCakes118
Size
48KB
MD5
0d4aecf1106a5499bff980dbc1e9d0c6
SHA1
429bd3b7c7be0cf65b4fe98337f294e49449f27b
SHA256
1aace79d634b6a1aeb44a015ae07e5eb299a8187e96891f906c921ee437e0dec
SHA512
bd38ae781fdcb2ca61726fe557dc7568ce9b13d8322f57a73b7137fe745e1ffc80027ee5ec35abcfd4cc758303b23bc544a8a92a5012aeae20cbd94dfe611b0f
SSDEEP
768:/9n/ZSVrZbKGB8Hc8Kg5SCNXoXLNUBJ+EJMGZDVa92W6qQ1:1aQbHc8KgEpbuJ+MZDVZWBQ1
Checks for missing Authenticode signature.
resource |
---|
0d4aecf1106a5499bff980dbc1e9d0c6_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
DisableThreadLibraryCalls
InitializeCriticalSection
DeleteCriticalSection
LeaveCriticalSection
InterlockedIncrement
EnterCriticalSection
InterlockedDecrement
HeapDestroy
GetShortPathNameA
GetModuleHandleA
GetExitCodeProcess
CloseHandle
WaitForSingleObject
CreateProcessA
GetSystemDirectoryA
Sleep
FindNextFileA
DeleteFileA
SetFileAttributesA
GetPrivateProfileStringA
FindFirstFileA
CreateThread
ExitProcess
WritePrivateProfileStringA
Process32Next
Process32First
GetCommandLineW
MoveFileA
GetCurrentProcessId
GetModuleFileNameA
lstrlenW
WideCharToMultiByte
LoadLibraryA
GetProcAddress
FreeLibrary
lstrlenA
LocalFree
MultiByteToWideChar
CreateDirectoryA
RegOpenKeyExA
RegQueryValueExA
RegQueryInfoKeyA
RegEnumKeyExA
RegDeleteKeyA
RegCloseKey
GetNamedSecurityInfoA
BuildExplicitAccessWithNameA
SetEntriesInAclA
SetNamedSecurityInfoA
RegCreateKeyExA
RegSetValueExA
CommandLineToArgvW
SHGetSpecialFolderPathA
CoMarshalInterThreadInterfaceInStream
CoUninitialize
CoGetInterfaceAndReleaseStream
CoInitialize
CoCreateInstance
SysStringLen
LoadRegTypeLi
SysAllocString
VariantClear
SysFreeString
memcpy
_strlwr
_stricmp
_adjust_fdiv
malloc
_initterm
free
strcmp
strrchr
strcpy
strncmp
strncpy
strchr
atoi
strcat
_access
memset
??3@YAXPAX@Z
memcmp
wcsstr
_wcslwr
strstr
strlen
_strupr
_purecall
??2@YAPAXI@Z
sprintf
SHDeleteKeyA
SHSetValueA
DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ