DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
28c49ff3d1133811750cc5d66d8a1534_JaffaCakes118.dll
Resource
win7-20240704-en
Target
28c49ff3d1133811750cc5d66d8a1534_JaffaCakes118
Size
60KB
MD5
28c49ff3d1133811750cc5d66d8a1534
SHA1
841a35ec199308c20fc2a21d9a13d3ecdf6be9a1
SHA256
4222b3468f85e674e23f40a99420411b00adaf87d90fb358b63992f65b5eb194
SHA512
2c5d0a3d5c1ecba1aa17f42a28bf4000883af1d109c3946ef33bfce23985ad309e389ecf7e1d857d7237cf14ed9fa366737a781da9e5398861d182c4c01f53de
SSDEEP
1536:haKPmVGLrL98sm1ohmZerWMhcxygJZrpoK:+QLY1bejhcsgJhpoK
Checks for missing Authenticode signature.
resource |
---|
28c49ff3d1133811750cc5d66d8a1534_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Process32First
FindNextFileA
DeleteFileA
SetFileAttributesA
GetPrivateProfileStringA
FindFirstFileA
MoveFileA
MultiByteToWideChar
lstrlenA
ExitProcess
GetProcAddress
Process32Next
lstrlenW
CreateThread
DisableThreadLibraryCalls
InitializeCriticalSection
DeleteCriticalSection
InterlockedIncrement
InterlockedDecrement
HeapDestroy
GetShortPathNameA
GetModuleHandleA
CreateDirectoryA
EnterCriticalSection
LeaveCriticalSection
GetSystemDirectoryA
CreateProcessA
WaitForSingleObject
CloseHandle
GetExitCodeProcess
GetModuleFileNameA
LoadLibraryA
FreeLibrary
GetCommandLineW
LocalFree
Sleep
GetCurrentProcessId
WritePrivateProfileStringA
WideCharToMultiByte
RegCreateKeyExA
RegSetValueExA
RegQueryValueExA
GetNamedSecurityInfoA
BuildExplicitAccessWithNameA
SetEntriesInAclA
SetNamedSecurityInfoA
RegOpenKeyExA
RegQueryInfoKeyA
RegEnumKeyExA
RegDeleteKeyA
RegCloseKey
CommandLineToArgvW
SHGetSpecialFolderPathA
CoGetInterfaceAndReleaseStream
CoCreateInstance
CoMarshalInterThreadInterfaceInStream
CoInitialize
CoUninitialize
SysStringLen
LoadRegTypeLi
SysAllocString
VariantClear
SysFreeString
strcat
_strlwr
_stricmp
_adjust_fdiv
malloc
_initterm
free
strncmp
strncpy
_access
_purecall
memcpy
fopen
fseek
ftell
fread
sprintf
??3@YAXPAX@Z
strstr
strcmp
strrchr
memset
wcsstr
_wcslwr
??2@YAPAXI@Z
strlen
_strupr
strcpy
memcmp
atoi
strchr
fclose
SHDeleteValueA
SHDeleteKeyA
SHSetValueA
DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ