DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
31a94e0fb6f8114e1b5613858964ba31_JaffaCakes118.dll
Resource
win7-20240708-en
Target
31a94e0fb6f8114e1b5613858964ba31_JaffaCakes118
Size
68KB
MD5
31a94e0fb6f8114e1b5613858964ba31
SHA1
64aa858b069cd50e790d280841d6a76fed8b2868
SHA256
db2f30f059ac5187d9eae057fa85cd9e83711f1e0011aba6d72edb4386a0b96b
SHA512
3f5deabda66c31ae7b349afbbf5631f7d70a02c888006b41b11d240427c5d2f983e6b4776c3e7d295d1fa5c9424bd779e6334d11958f75e98b96a7dc397c3032
SSDEEP
1536:QUAW4HYsG7jHIbqwpw0Ev6+RA7JFlnO4vIXfDBqeK:QUma7jIpws7JFH0fD4
Checks for missing Authenticode signature.
resource |
---|
31a94e0fb6f8114e1b5613858964ba31_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
SetFileAttributesA
GetPrivateProfileStringA
FindFirstFileA
LocalFree
ExitProcess
CloseHandle
GetCurrentProcessId
GetCommandLineW
CreateProcessA
RemoveDirectoryA
CreateDirectoryA
FindNextFileA
LoadLibraryA
WideCharToMultiByte
GetProcAddress
Process32Next
Process32First
GetExitCodeProcess
WaitForSingleObject
GetSystemDirectoryA
CreateThread
MoveFileA
DeleteFileA
Sleep
WritePrivateProfileStringA
GetModuleFileNameA
GetModuleHandleA
GetShortPathNameA
lstrlenA
MultiByteToWideChar
lstrlenW
HeapDestroy
InterlockedDecrement
EnterCriticalSection
InterlockedIncrement
LeaveCriticalSection
DeleteCriticalSection
DisableThreadLibraryCalls
InitializeCriticalSection
FreeLibrary
GetNamedSecurityInfoA
BuildExplicitAccessWithNameA
SetEntriesInAclA
SetNamedSecurityInfoA
RegDeleteKeyA
RegQueryInfoKeyA
RegEnumKeyExA
RegOpenKeyExA
RegQueryValueExA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
SHGetSpecialFolderPathA
CommandLineToArgvW
CoUninitialize
CoInitialize
CoMarshalInterThreadInterfaceInStream
CoGetInterfaceAndReleaseStream
CoCreateInstance
SysAllocString
VariantClear
SysStringLen
LoadRegTypeLi
SysFreeString
strchr
_strlwr
_stricmp
_adjust_fdiv
malloc
_initterm
free
strcmp
atoi
_access
strrchr
strcat
fopen
fseek
ftell
fread
??3@YAXPAX@Z
memcpy
_purecall
??2@YAPAXI@Z
memcmp
sprintf
strstr
wcsstr
_wcslwr
strncpy
_strupr
memset
strncmp
strlen
strcpy
fclose
SHSetValueA
SHDeleteValueA
SHDeleteKeyA
DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ