DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
0e83ca35cf42037cf03b5e97b38e0287_JaffaCakes118.dll
Resource
win7-20240221-en
Target
0e83ca35cf42037cf03b5e97b38e0287_JaffaCakes118
Size
48KB
MD5
0e83ca35cf42037cf03b5e97b38e0287
SHA1
e02d529bfcf1faa5d1e2bcbe6f196b4a0abb6b5d
SHA256
5b5156780818502de9e82dac7ad53bab4abb4c8c68dbdedd77af76ebaf0f6257
SHA512
25b85f591de561a47434e86ecaecaa17d113ad09d75818824b49e087713bacb9fa84f85dfeaff4401779558e0d2153df80696f1d8788a5c28c9e7e678eac7fd8
SSDEEP
768:YBjcuIAPRbDuYwhkhHRxnEzOmpyeW6hv0xTbZo8n5/nnpig17kOcpNXLfDftJ:YCuNZbDuR6xa1oSwnZnltgVv1
Checks for missing Authenticode signature.
resource |
---|
0e83ca35cf42037cf03b5e97b38e0287_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
lstrlenA
WideCharToMultiByte
lstrlenW
GetModuleFileNameA
Sleep
CreateProcessA
GetSystemDirectoryA
Process32Next
Process32First
GetExitCodeProcess
WaitForSingleObject
GetCommandLineW
FindNextFileA
DeleteFileA
MultiByteToWideChar
GetPrivateProfileStringA
FindFirstFileA
WritePrivateProfileStringA
MoveFileA
CreateDirectoryA
DisableThreadLibraryCalls
InitializeCriticalSection
DeleteCriticalSection
InterlockedIncrement
InterlockedDecrement
HeapDestroy
GetShortPathNameA
GetModuleHandleA
ExitProcess
GetProcAddress
EnterCriticalSection
LeaveCriticalSection
LocalFree
LoadLibraryA
FreeLibrary
CloseHandle
GetCurrentProcessId
CreateThread
SetFileAttributesA
RegDeleteKeyA
RegEnumKeyExA
GetNamedSecurityInfoA
BuildExplicitAccessWithNameA
SetEntriesInAclA
SetNamedSecurityInfoA
RegQueryInfoKeyA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
RegCreateKeyExA
RegSetValueExA
CommandLineToArgvW
SHGetSpecialFolderPathA
CoCreateInstance
CoGetInterfaceAndReleaseStream
CoInitialize
CoUninitialize
CoMarshalInterThreadInterfaceInStream
VariantClear
SysStringLen
LoadRegTypeLi
SysAllocString
SysFreeString
memcmp
_strlwr
_stricmp
_adjust_fdiv
malloc
_initterm
free
atoi
_purecall
_access
??2@YAPAXI@Z
strncmp
strchr
strncpy
strcmp
memcpy
??3@YAXPAX@Z
strstr
strlen
memset
strcat
strcpy
sprintf
_strupr
wcsstr
_wcslwr
strrchr
SHDeleteKeyA
SHSetValueA
DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ