DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
17866cff7b63fe5e204c8d6846a4c877_JaffaCakes118.dll
Resource
win7-20240419-en
Target
17866cff7b63fe5e204c8d6846a4c877_JaffaCakes118
Size
76KB
MD5
17866cff7b63fe5e204c8d6846a4c877
SHA1
660cd8bab7275b9c76cb44e37f948459bb5d35c4
SHA256
667bf61d8e4e6b3519fa17fe9c5444813dedd20bc07431fce08808a5ddf1d3bd
SHA512
56ff502371264a1617d03d1d29af8719e5281b10ff10179c09ab9c40f2b1daccb8f236abfc728e73c669c3db798cf00da47cebe808abecbfc7eb67b396d17d7d
SSDEEP
768:4tc1wUOXZc/yxlL6g9pV9DW4ohn116QGiIYW/w7YXgrUBPRy3BoO1t413n8CweQ/:cwwvcyR/V9DWFt6Nl/w7YXgooOQz/c
Checks for missing Authenticode signature.
resource |
---|
17866cff7b63fe5e204c8d6846a4c877_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetModuleFileNameA
LocalFree
GetProcAddress
LoadLibraryA
CreateThread
WritePrivateProfileStringA
FreeLibrary
WideCharToMultiByte
GetCommandLineW
GetModuleHandleA
Process32Next
Process32First
MoveFileA
Sleep
CreateProcessA
RemoveDirectoryA
GetCurrentProcessId
ExitProcess
CreateDirectoryA
GetExitCodeProcess
WaitForSingleObject
GetSystemDirectoryA
GetShortPathNameA
lstrlenA
MultiByteToWideChar
lstrlenW
HeapDestroy
InterlockedDecrement
EnterCriticalSection
InterlockedIncrement
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
DisableThreadLibraryCalls
FindFirstFileA
GetPrivateProfileStringA
SetFileAttributesA
FindNextFileA
DeleteFileA
CloseHandle
RegDeleteKeyA
RegEnumKeyExA
RegQueryInfoKeyA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
GetNamedSecurityInfoA
BuildExplicitAccessWithNameA
SetEntriesInAclA
SetNamedSecurityInfoA
RegCreateKeyExA
RegSetValueExA
SHGetSpecialFolderPathA
CommandLineToArgvW
CoMarshalInterThreadInterfaceInStream
CoUninitialize
CoGetInterfaceAndReleaseStream
CoInitialize
CoCreateInstance
SysAllocString
VariantClear
SysStringLen
LoadRegTypeLi
SysFreeString
wcsstr
_strlwr
_strupr
_adjust_fdiv
malloc
_initterm
free
atoi
strncmp
strchr
strncpy
fopen
fseek
ftell
fread
fclose
strstr
memset
strrchr
sprintf
strcat
memcpy
_purecall
??3@YAXPAX@Z
??2@YAPAXI@Z
memcmp
_stricmp
_wcslwr
strcpy
strlen
strcmp
_access
SHDeleteValueA
SHDeleteKeyA
SHSetValueA
DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ