DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
16ed6ecdf6cac4c641a5e03c5d94f76d_JaffaCakes118.dll
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
16ed6ecdf6cac4c641a5e03c5d94f76d_JaffaCakes118.dll
Resource
win10v2004-20240508-en
Target
16ed6ecdf6cac4c641a5e03c5d94f76d_JaffaCakes118
Size
80KB
MD5
16ed6ecdf6cac4c641a5e03c5d94f76d
SHA1
0ad855952fec28e67b3736e5a3da16e235c12d5b
SHA256
0db0a5f6b748ecba37760fab93fcff8446be18a260e3264542a761675a0b6044
SHA512
49c60eeb5f80cc7f307df651ed4daaf820c6e81ce68c44bb3354ba72303e039298198445d60154c13e8e6de94fbb46f4198a8d369a73ad77300e62433ff92f25
SSDEEP
1536:y8jfDwtn2OGECnSlfsL9gNvlxKYPBFYC9TqE8+U846q:xDwtw7JgNLRdqq46q
Checks for missing Authenticode signature.
resource |
---|
16ed6ecdf6cac4c641a5e03c5d94f76d_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetExitCodeProcess
WaitForSingleObject
CreateProcessA
GetSystemDirectoryA
GetProcAddress
LoadLibraryA
RemoveDirectoryA
DeleteFileA
CreateThread
MoveFileA
SetFileAttributesA
FreeLibrary
FindNextFileA
Sleep
FindFirstFileA
LocalFree
ExitProcess
Process32Next
Process32First
GetCurrentProcessId
GetCommandLineW
CreateDirectoryA
WideCharToMultiByte
CloseHandle
GetModuleHandleA
GetShortPathNameA
lstrlenA
MultiByteToWideChar
lstrlenW
HeapDestroy
InterlockedDecrement
EnterCriticalSection
InterlockedIncrement
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
DisableThreadLibraryCalls
GetModuleFileNameA
WritePrivateProfileStringA
GetPrivateProfileStringA
GetNamedSecurityInfoA
RegDeleteKeyA
BuildExplicitAccessWithNameA
SetEntriesInAclA
SetNamedSecurityInfoA
RegEnumKeyExA
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
RegQueryInfoKeyA
RegCreateKeyExA
RegSetValueExA
SHGetSpecialFolderPathA
CommandLineToArgvW
CoMarshalInterThreadInterfaceInStream
CoUninitialize
CoGetInterfaceAndReleaseStream
CoInitialize
CoCreateInstance
SysAllocString
VariantClear
SysStringLen
LoadRegTypeLi
SysFreeString
strcpy
_stricmp
_strlwr
_adjust_fdiv
malloc
_initterm
free
atoi
fopen
fseek
ftell
fread
fclose
_wcslwr
wcsstr
strcmp
strstr
memset
strlen
sprintf
memcpy
_purecall
??3@YAXPAX@Z
??2@YAPAXI@Z
memcmp
strcat
_strupr
strncpy
strchr
strncmp
_access
strrchr
SHDeleteValueA
SHDeleteKeyA
SHSetValueA
DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ