DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
414f20df5a59e9b088538bbdcbacda63_JaffaCakes118.dll
Resource
win7-20240708-en
Target
414f20df5a59e9b088538bbdcbacda63_JaffaCakes118
Size
80KB
MD5
414f20df5a59e9b088538bbdcbacda63
SHA1
59451706360817f21696682310b012dac19c8ba9
SHA256
02039f2080660d949fc1cf87b80bfa11dd0f48da26b2fc89b0c3ae22f5566ef9
SHA512
920ae766eb1715bb9a144d1a2b4621d481d8ee6616557b888625a295486a1102c4f168c068bd4c0b8ae950d34b5075a68a4ddaf343912710b6d55f47e3a7641e
SSDEEP
1536:Zs7YbcjFXQRmN3uioh9V539hH5Q0mLN/4Xiq74/y5sCzt+5:ZiY0emNMzOZ4Xivy5sCZ+5
Checks for missing Authenticode signature.
resource |
---|
414f20df5a59e9b088538bbdcbacda63_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
HeapDestroy
MultiByteToWideChar
lstrlenA
GetShortPathNameA
GetModuleHandleA
GetModuleFileNameA
MoveFileA
DeleteFileA
SetFileAttributesA
GetCommandLineW
CreateProcessA
RemoveDirectoryA
GetExitCodeProcess
InterlockedDecrement
GetSystemDirectoryA
WritePrivateProfileStringA
ExitProcess
CreateDirectoryA
FindNextFileA
GetPrivateProfileStringA
FindFirstFileA
LocalFree
EnterCriticalSection
InterlockedIncrement
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
DisableThreadLibraryCalls
FreeLibrary
GetCurrentProcessId
Sleep
lstrlenW
WideCharToMultiByte
CreateThread
LoadLibraryA
GetProcAddress
Process32First
CloseHandle
Process32Next
WaitForSingleObject
BuildExplicitAccessWithNameA
RegDeleteKeyA
SetEntriesInAclA
GetNamedSecurityInfoA
SetNamedSecurityInfoA
RegQueryInfoKeyA
RegEnumKeyExA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
RegCreateKeyExA
RegSetValueExA
SHGetSpecialFolderPathA
CommandLineToArgvW
CoCreateInstance
CoUninitialize
CoGetInterfaceAndReleaseStream
CoInitialize
CoMarshalInterThreadInterfaceInStream
SysAllocString
VariantClear
SysStringLen
LoadRegTypeLi
SysFreeString
memcpy
_strlwr
_stricmp
_adjust_fdiv
malloc
_initterm
free
fopen
fseek
ftell
fread
fclose
strrchr
strcmp
_wcslwr
wcsstr
sprintf
strcpy
??3@YAXPAX@Z
atoi
strchr
strstr
strlen
strncpy
memset
strncmp
_strupr
_purecall
??2@YAPAXI@Z
memcmp
strcat
_access
SHDeleteValueA
SHSetValueA
SHDeleteKeyA
DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ