DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
39609580d2d34c7e1069e5a1954e1d16_JaffaCakes118.dll
Resource
win7-20240708-en
Target
39609580d2d34c7e1069e5a1954e1d16_JaffaCakes118
Size
80KB
MD5
39609580d2d34c7e1069e5a1954e1d16
SHA1
b67421b73df682b25c5835e7afbab52720283f16
SHA256
0abda7ba7f93e5f295549d05f160d2000bb599a2219fe1678d0dbcade3c6960c
SHA512
474ad8d1531e6f2aeb40eebce49f3eebdfac7ab3ffa07a1f6d8b61a4e67e85cc819a0530f68e32724301a007d7428764d233bfaef97d06239c09a3b509413241
SSDEEP
1536:jxA8PZ0hh+v/sluTn5+SUKlR+YimVe2k8hkw5VIX82:tA8Pu+/T57ziIeGhKX82
Checks for missing Authenticode signature.
resource |
---|
39609580d2d34c7e1069e5a1954e1d16_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
InitializeCriticalSection
DeleteCriticalSection
LeaveCriticalSection
InterlockedIncrement
EnterCriticalSection
InterlockedDecrement
HeapDestroy
GetShortPathNameA
GetModuleHandleA
CloseHandle
CreateProcessA
GetSystemDirectoryA
Sleep
DisableThreadLibraryCalls
RemoveDirectoryA
Process32Next
Process32First
FindNextFileA
GetPrivateProfileStringA
FindFirstFileA
WritePrivateProfileStringA
GetExitCodeProcess
WaitForSingleObject
CreateThread
DeleteFileA
MoveFileA
GetCommandLineW
FreeLibrary
CreateDirectoryA
SetFileAttributesA
LocalFree
LoadLibraryA
GetProcAddress
GetModuleFileNameA
WideCharToMultiByte
lstrlenA
MultiByteToWideChar
ExitProcess
lstrlenW
GetCurrentProcessId
RegCreateKeyExA
RegSetValueExA
RegOpenKeyExA
RegQueryInfoKeyA
RegEnumKeyExA
RegDeleteKeyA
RegCloseKey
BuildExplicitAccessWithNameA
SetEntriesInAclA
GetNamedSecurityInfoA
SetNamedSecurityInfoA
RegQueryValueExA
SHGetSpecialFolderPathA
CommandLineToArgvW
CoInitialize
CoGetInterfaceAndReleaseStream
CoMarshalInterThreadInterfaceInStream
CoUninitialize
CoCreateInstance
SysStringLen
LoadRegTypeLi
VariantClear
SysAllocString
SysFreeString
_purecall
_strupr
_strlwr
_adjust_fdiv
malloc
_initterm
free
atoi
fopen
fseek
ftell
fread
fclose
_wcslwr
wcsstr
strncmp
??3@YAXPAX@Z
memcmp
memcpy
strstr
sprintf
_access
strcat
memset
strlen
??2@YAPAXI@Z
_stricmp
strcmp
strrchr
strcpy
strncpy
strchr
SHSetValueA
SHDeleteValueA
SHDeleteKeyA
DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ