DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
23908b85685eb59d88b92b511d5a5c00_JaffaCakes118.dll
Resource
win7-20240611-en
Target
23908b85685eb59d88b92b511d5a5c00_JaffaCakes118
Size
72KB
MD5
23908b85685eb59d88b92b511d5a5c00
SHA1
a18640bc053465bb8ddd38e346eeffc3d881e398
SHA256
2fa1ab0e13602bfc68ce20f0d787765c1447fc95616685f548e742eb1354844e
SHA512
981defe49ed6b3aca3e9e8cbd09ae510ba6076bb05a1c2de38e1109171bdd2c353375ae0bd6de69eebd85eb2f35037b9e417564098fd311841f2a2c38ab45b27
SSDEEP
1536:Iv2qmTWjQ7XDC+foGzakEWSJoE2k9biRwDHWGJ:ujjQXTaSE2khiuDHF
Checks for missing Authenticode signature.
resource |
---|
23908b85685eb59d88b92b511d5a5c00_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
CreateDirectoryA
DeleteFileA
FindNextFileA
GetPrivateProfileStringA
FindFirstFileA
WritePrivateProfileStringA
Sleep
MoveFileA
SetFileAttributesA
RemoveDirectoryA
LocalFree
CreateThread
GetCommandLineW
GetSystemDirectoryA
Process32First
DisableThreadLibraryCalls
InitializeCriticalSection
DeleteCriticalSection
InterlockedIncrement
InterlockedDecrement
HeapDestroy
GetShortPathNameA
GetModuleHandleA
ExitProcess
CreateProcessA
WaitForSingleObject
CloseHandle
GetExitCodeProcess
GetCurrentProcessId
GetModuleFileNameA
lstrlenW
WideCharToMultiByte
lstrlenA
MultiByteToWideChar
FreeLibrary
EnterCriticalSection
LeaveCriticalSection
GetProcAddress
LoadLibraryA
Process32Next
GetNamedSecurityInfoA
SetEntriesInAclA
SetNamedSecurityInfoA
RegQueryInfoKeyA
RegEnumKeyExA
RegOpenKeyExA
RegQueryValueExA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
RegDeleteKeyA
BuildExplicitAccessWithNameA
SHGetSpecialFolderPathA
CommandLineToArgvW
CoInitialize
CoUninitialize
CoGetInterfaceAndReleaseStream
CoMarshalInterThreadInterfaceInStream
CoCreateInstance
SysStringLen
LoadRegTypeLi
VariantClear
SysAllocString
SysFreeString
fseek
_strlwr
_stricmp
_adjust_fdiv
malloc
_initterm
free
_purecall
memcpy
strcmp
atoi
_wcslwr
wcsstr
strcpy
strlen
strncmp
??3@YAXPAX@Z
memcmp
memset
sprintf
_access
strcat
fclose
fread
??2@YAPAXI@Z
ftell
_strupr
fopen
strrchr
strstr
strncpy
strchr
SHSetValueA
SHDeleteKeyA
SHDeleteValueA
DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ