DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Overview
overview
7Static
static
4Exifcleane...xt.dll
windows7-x64
1Exifcleane...xt.dll
windows10-2004-x64
1Exifcleane...64.dll
windows7-x64
7Exifcleane...64.dll
windows10-2004-x64
7Exifcleane...nr.exe
windows7-x64
1Exifcleane...nr.exe
windows10-2004-x64
1Exifcleane...me.pdf
windows7-x64
1Exifcleane...me.pdf
windows10-2004-x64
1Behavioral task
behavioral1
Sample
Exifcleaner-portable/ECExt.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
Exifcleaner-portable/ECExt.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral3
Sample
Exifcleaner-portable/ECExt_64.dll
Resource
win7-20240611-en
Behavioral task
behavioral4
Sample
Exifcleaner-portable/ECExt_64.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral5
Sample
Exifcleaner-portable/ExifClnr.exe
Resource
win7-20240508-en
Behavioral task
behavioral6
Sample
Exifcleaner-portable/ExifClnr.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
Exifcleaner-portable/readme.pdf
Resource
win7-20240611-en
Behavioral task
behavioral8
Sample
Exifcleaner-portable/readme.pdf
Resource
win10v2004-20240611-en
Target
179f28e5bc733bb400b1440f3c297868_JaffaCakes118
Size
543KB
MD5
179f28e5bc733bb400b1440f3c297868
SHA1
4647849e5e928e1f5b37654921ecac04e0d8aa64
SHA256
57e17a8d13da2668ff2bec482af5d47d8e113694e0ebeaf73aa96ed5fbe4730b
SHA512
4b683f6bb4dd32dfc79afe715e0cc69e6c4ba58b9ab1239e907711e28e7fed0fbd0799eecf26af83dbbe3331359404d665365561a9e1e3523b4c3460902b5f59
SSDEEP
12288:/oyxuIfYujIK0vgfVNTCWVOEg94FHQ28M7sdeU3:gKu46vgnTnBgZQwh
Detects HTTP links in interactive objects within PDF files.
resource | yara_rule |
---|---|
static1/unpack001/Exifcleaner-portable/readme.pdf | pdf_with_link_action |
Checks for missing Authenticode signature.
resource |
---|
unpack001/Exifcleaner-portable/ECExt.dll |
unpack001/Exifcleaner-portable/ECExt_64.dll |
unpack001/Exifcleaner-portable/ExifClnr.exe |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GlobalLock
lstrcpynW
MultiByteToWideChar
GlobalUnlock
GetTempPathA
lstrlenW
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InterlockedIncrement
InterlockedDecrement
DisableThreadLibraryCalls
InitializeCriticalSection
GetVersion
GetModuleFileNameA
lstrlenA
lstrcpynA
lstrcatA
lstrcpyA
GetTempFileNameA
InsertMenuA
RegSetValueExA
RegDeleteValueA
RegOpenKeyExA
RegCloseKey
DragQueryFileA
ShellExecuteA
ReleaseStgMedium
SysStringLen
LoadRegTypeLi
SysFreeString
ord18
ord58
ord15
ord16
ord21
ord32
ord57
ord30
ord23
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
malloc
_initterm
?terminate@@YAXXZ
_except_handler3
free
fopen
fprintf
_adjust_fdiv
memcpy
_purecall
??2@YAPAXI@Z
__CxxFrameHandler
memcmp
strlen
fclose
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DLL
EnterCriticalSection
WideCharToMultiByte
lstrcpynA
GetTempFileNameW
GetTempPathW
LeaveCriticalSection
GlobalLock
HeapReAlloc
HeapFree
GetVersion
GetModuleFileNameW
lstrcpynW
lstrcatW
lstrcpyW
DisableThreadLibraryCalls
HeapCreate
GetVersionExW
GetSystemInfo
HeapAlloc
lstrlenW
DeleteCriticalSection
InitializeCriticalSection
GlobalUnlock
__C_specific_handler
InsertMenuW
RegDeleteValueW
RegOpenKeyExW
RegSetValueExW
RegCloseKey
ShellExecuteW
DragQueryFileW
ReleaseStgMedium
SysFreeString
LoadRegTypeLi
SysStringLen
ord18
ord32
ord16
ord23
ord57
ord15
ord58
ord30
ord21
??0?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QEAA@PEBGAEBV?$allocator@G@1@@Z
??1?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QEAA@XZ
??0?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QEAA@AEBV01@@Z
?c_str@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QEBAPEBGXZ
memset
?terminate@@YAXXZ
memcpy
__CxxFrameHandler
memcmp
fclose
fwprintf
_wfopen
setlocale
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
calloc
free
malloc
realloc
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
RegQueryValueExA
_TrackMouseEvent
GetOpenFileNameA
UnrealizeObject
CreateStreamOnHGlobal
LresultFromObject
SafeArrayPtrOfIndex
ShellExecuteExA
CreateWindowExA
VerQueryValueA
timeGetTime
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
http://forum.superutils.com/
http://www.superutils.com/contact/
http://www.superutils.com/products/exifcleaner/#ordering