DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
0e83e4be20fce4c921e5e1dd3783258f_JaffaCakes118.dll
Resource
win7-20240508-en
Target
0e83e4be20fce4c921e5e1dd3783258f_JaffaCakes118
Size
60KB
MD5
0e83e4be20fce4c921e5e1dd3783258f
SHA1
756664dc712649ac3e93cf1d54e60ce122003581
SHA256
3d281c0d6185bb202499c75e62177d1a447f3fb6071c58857cb1943767a5eb8b
SHA512
12de49b90c0d5f569d8d50b3e298ad15e392c1d907183382dfb01f11f32ca4c39361d19ce37752b3b1da69b28167075052e34a6d057ee0c135a92be22e387a7d
SSDEEP
1536:spZ3HQfMcZJkthx/5QZY7LDhtNQ54Kge+hCUGfF4e:wZ3KMFQOrNc4be/UGtF
Checks for missing Authenticode signature.
resource |
---|
0e83e4be20fce4c921e5e1dd3783258f_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetShortPathNameA
GetModuleHandleA
GetModuleFileNameA
WideCharToMultiByte
CreateProcessA
RemoveDirectoryA
DeleteFileA
CreateThread
FindNextFileA
GetPrivateProfileStringA
FindFirstFileA
CloseHandle
Process32Next
lstrlenA
FreeLibrary
WritePrivateProfileStringA
SetFileAttributesA
GetCommandLineW
ExitProcess
MoveFileA
CreateDirectoryA
GetExitCodeProcess
WaitForSingleObject
GetSystemDirectoryA
MultiByteToWideChar
lstrlenW
HeapDestroy
InterlockedDecrement
EnterCriticalSection
InterlockedIncrement
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
DisableThreadLibraryCalls
LocalFree
LoadLibraryA
GetProcAddress
Sleep
GetCurrentProcessId
Process32First
SetEntriesInAclA
BuildExplicitAccessWithNameA
SetNamedSecurityInfoA
RegCreateKeyExA
RegSetValueExA
RegOpenKeyExA
RegQueryInfoKeyA
RegEnumKeyExA
RegDeleteKeyA
RegCloseKey
RegQueryValueExA
GetNamedSecurityInfoA
SHGetSpecialFolderPathA
CommandLineToArgvW
CoGetInterfaceAndReleaseStream
CoCreateInstance
CoMarshalInterThreadInterfaceInStream
CoInitialize
CoUninitialize
VariantClear
SysAllocString
SysStringLen
LoadRegTypeLi
SysFreeString
_access
_strlwr
_stricmp
_adjust_fdiv
malloc
_initterm
free
atoi
strcmp
_wcslwr
wcsstr
fopen
fseek
ftell
fread
fclose
??3@YAXPAX@Z
sprintf
memcpy
_purecall
??2@YAPAXI@Z
memcmp
strlen
strcat
strcpy
memset
_strupr
strstr
strrchr
strncpy
strchr
strncmp
SHSetValueA
SHDeleteValueA
SHDeleteKeyA
DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ