DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
3f612425621c26896d920e868cc91b52_JaffaCakes118.dll
Resource
win7-20240705-en
Target
3f612425621c26896d920e868cc91b52_JaffaCakes118
Size
36KB
MD5
3f612425621c26896d920e868cc91b52
SHA1
1e98995a07aa5ab2ae0fbd20eb9caa31b003b545
SHA256
82887411b3b33f3bf63d6a9df117e7da2a6ed640b8092b577ba1e4a7b444fe67
SHA512
e4ac0173b7a128f381b29aa61f838fa8a5f4132eea6bf1a2b215b0ccb249b3540a84caf41ca3630d2ccad5362a5f592de3e0a57e0820caf08b1a44f2420ff3cd
SSDEEP
768:G4pcmKiyAcXZCWZz6k0p8SzdFqj4qeJ/pBStj:G4pnKiBa36p8SmMlJRkp
Checks for missing Authenticode signature.
resource |
---|
3f612425621c26896d920e868cc91b52_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
FreeLibrary
LoadLibraryA
MultiByteToWideChar
lstrlenA
WideCharToMultiByte
lstrlenW
GetModuleFileNameA
DisableThreadLibraryCalls
InitializeCriticalSection
DeleteCriticalSection
GetCurrentProcessId
InterlockedDecrement
HeapDestroy
GetShortPathNameA
GetModuleHandleA
GetExitCodeProcess
WaitForSingleObject
CreateProcessA
GetSystemDirectoryA
Sleep
FindNextFileA
FindFirstFileA
MoveFileA
DeleteFileA
SetFileAttributesA
ExitProcess
CreateThread
GetCommandLineW
EnterCriticalSection
LeaveCriticalSection
CreateToolhelp32Snapshot
Process32First
Process32Next
InterlockedIncrement
CloseHandle
IsWindow
FindWindowExA
SetWindowTextA
SendMessageA
RegCloseKey
RegEnumKeyExA
RegQueryInfoKeyA
RegOpenKeyExA
RegSetValueExA
RegCreateKeyExA
RegQueryValueExA
RegDeleteKeyA
SHGetSpecialFolderPathA
CommandLineToArgvW
CoCreateInstance
CoInitialize
VariantClear
SysStringLen
LoadRegTypeLi
SysAllocString
SysFreeString
_stricmp
_strlwr
_strupr
_adjust_fdiv
malloc
_initterm
free
strcat
strrchr
strlen
memset
??2@YAPAXI@Z
_purecall
memcpy
memcmp
strstr
sprintf
strcpy
??3@YAXPAX@Z
wcsstr
_wcslwr
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ