DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
21fbdf28864c9fe7627904819393594f_JaffaCakes118.dll
Resource
win7-20240220-en
Target
21fbdf28864c9fe7627904819393594f_JaffaCakes118
Size
72KB
MD5
21fbdf28864c9fe7627904819393594f
SHA1
9f3249e176d0491d3c1d5941494d602aa8d32835
SHA256
06c3ee8597d88f85c42f1b0fd81103f9afb26f55968d7cf67c4c1a917c69bfbc
SHA512
f24c859a44d168800675b9c11b971682dcc6f7bcfeb7eb31e9d5fd2bcb2157d4776fb9d813e4be0669223e35a8371cdc8276015728301d94cdc1474a815f5fdf
SSDEEP
768:ZalL+1xvdV65aEw2nMWo/HZrStySkgznoqRIT9OOZav6CBd5zzR272:eYdV65J9OvR7grlRIhOOZo9/p2y
Checks for missing Authenticode signature.
resource |
---|
21fbdf28864c9fe7627904819393594f_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Process32First
CreateDirectoryA
FindNextFileA
GetPrivateProfileStringA
FindFirstFileA
GetCommandLineW
GetProcAddress
DisableThreadLibraryCalls
InitializeCriticalSection
DeleteCriticalSection
LeaveCriticalSection
InterlockedIncrement
EnterCriticalSection
Process32Next
HeapDestroy
GetShortPathNameA
GetModuleHandleA
Sleep
LocalFree
RemoveDirectoryA
CreateThread
GetCurrentProcessId
WritePrivateProfileStringA
ExitProcess
LoadLibraryA
FreeLibrary
SetFileAttributesA
DeleteFileA
MoveFileA
lstrlenA
MultiByteToWideChar
lstrlenW
WideCharToMultiByte
GetSystemDirectoryA
GetModuleFileNameA
CreateProcessA
WaitForSingleObject
GetExitCodeProcess
CloseHandle
InterlockedDecrement
RegSetValueExA
GetNamedSecurityInfoA
BuildExplicitAccessWithNameA
SetEntriesInAclA
SetNamedSecurityInfoA
RegQueryValueExA
RegOpenKeyExA
RegQueryInfoKeyA
RegEnumKeyExA
RegCloseKey
RegDeleteKeyA
RegCreateKeyExA
CommandLineToArgvW
SHGetSpecialFolderPathA
CoUninitialize
CoGetInterfaceAndReleaseStream
CoCreateInstance
CoInitialize
CoMarshalInterThreadInterfaceInStream
SysFreeString
SysAllocString
SysStringLen
LoadRegTypeLi
VariantClear
SHSetValueA
SHDeleteValueA
SHDeleteKeyA
atoi
_stricmp
_strlwr
_adjust_fdiv
malloc
_initterm
free
strncmp
strncpy
fopen
fseek
ftell
fread
fclose
??2@YAPAXI@Z
_purecall
_wcslwr
wcsstr
strcat
_access
sprintf
memset
strlen
??3@YAXPAX@Z
memcmp
memcpy
_strupr
strchr
strstr
strcpy
strcmp
strrchr
DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ