DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
33673167d84c14fe8b8cc7dc676986f7_JaffaCakes118.dll
Resource
win7-20240704-en
Target
33673167d84c14fe8b8cc7dc676986f7_JaffaCakes118
Size
72KB
MD5
33673167d84c14fe8b8cc7dc676986f7
SHA1
fa27b70f3f45ad700e81013a42196e1422579544
SHA256
84a1973d5e2cbfb9de0ba85689e657e4e2bf270e601106f2195382d53ec14181
SHA512
73849c73371fffab99855b504ae98c9de845c1dadf82beb408d461b88e6cd232e72938f8ef8c63a5ada1201bced6a7f51d63f6f24764a9813168d5f58bfcd417
SSDEEP
1536:Z5RGKzExtlh2b1sJQag3V7D2nKyuT5+6H1g:ZzBPagVne3uT5J
Checks for missing Authenticode signature.
resource |
---|
33673167d84c14fe8b8cc7dc676986f7_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
WaitForSingleObject
CreateDirectoryA
FindNextFileA
GetPrivateProfileStringA
FindFirstFileA
GetProcAddress
MultiByteToWideChar
lstrlenA
WideCharToMultiByte
lstrlenW
GetExitCodeProcess
WritePrivateProfileStringA
Sleep
DisableThreadLibraryCalls
InitializeCriticalSection
DeleteCriticalSection
InterlockedIncrement
InterlockedDecrement
HeapDestroy
GetShortPathNameA
GetModuleHandleA
CreateThread
MoveFileA
ExitProcess
Process32First
Process32Next
GetCommandLineW
GetSystemDirectoryA
CloseHandle
LoadLibraryA
FreeLibrary
GetModuleFileNameA
EnterCriticalSection
LeaveCriticalSection
DeleteFileA
RemoveDirectoryA
CreateProcessA
SetFileAttributesA
GetCurrentProcessId
LocalFree
RegOpenKeyExA
RegQueryValueExA
RegQueryInfoKeyA
RegEnumKeyExA
RegDeleteKeyA
RegCloseKey
BuildExplicitAccessWithNameA
SetEntriesInAclA
GetNamedSecurityInfoA
SetNamedSecurityInfoA
RegCreateKeyExA
RegSetValueExA
SHGetSpecialFolderPathA
CommandLineToArgvW
CoUninitialize
CoInitialize
CoMarshalInterThreadInterfaceInStream
CoGetInterfaceAndReleaseStream
CoCreateInstance
VariantClear
SysStringLen
LoadRegTypeLi
SysAllocString
SysFreeString
memcmp
_strupr
_stricmp
_adjust_fdiv
malloc
_initterm
free
strncmp
strncpy
_purecall
fopen
fseek
ftell
fread
fclose
_wcslwr
sprintf
strcat
strcpy
memset
_access
??3@YAXPAX@Z
strlen
strcmp
strrchr
strstr
_strlwr
atoi
strchr
memcpy
??2@YAPAXI@Z
wcsstr
SHSetValueA
SHDeleteValueA
SHDeleteKeyA
DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ