DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
4361474e763682c5dca0b1f960e494f3_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
4361474e763682c5dca0b1f960e494f3_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
4361474e763682c5dca0b1f960e494f3_JaffaCakes118
Size
52KB
MD5
4361474e763682c5dca0b1f960e494f3
SHA1
72c2eec306cdc99150c16dfc9b2fa3f73ec5aeda
SHA256
ac150494b765ca3f6dac03bd31934897c6fb16669c4a326924d0f4c270c0e4cc
SHA512
83385d84b98a9030d4cedd2a8e02eeafa4f55e65b00952199fe908921f0f34d7a5a9f91fc801097196fd224d8a34afdc037ee9ae8a4b93e8d37cb130943bae73
SSDEEP
768:glN1Scv0AwA0cVyi2Q/at2vaQZuXKy/BYeGeWpC6BJd0xjXJgJapflascVn:e1BvZOcVsF+lxYW86KxjyJapks
Checks for missing Authenticode signature.
resource |
---|
4361474e763682c5dca0b1f960e494f3_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
FindNextFileA
SetFileAttributesA
GetPrivateProfileStringA
FindFirstFileA
MoveFileA
Process32Next
Process32First
GetExitCodeProcess
WaitForSingleObject
DisableThreadLibraryCalls
InitializeCriticalSection
DeleteCriticalSection
InterlockedIncrement
EnterCriticalSection
InterlockedDecrement
HeapDestroy
GetShortPathNameA
GetModuleHandleA
GetCurrentProcessId
CreateThread
WritePrivateProfileStringA
ExitProcess
GetCommandLineW
RemoveDirectoryA
LocalFree
DeleteFileA
GetProcAddress
WideCharToMultiByte
lstrlenA
MultiByteToWideChar
lstrlenW
LoadLibraryA
FreeLibrary
Sleep
GetSystemDirectoryA
GetModuleFileNameA
CreateProcessA
CreateDirectoryA
CloseHandle
LeaveCriticalSection
BuildExplicitAccessWithNameA
SetEntriesInAclA
GetNamedSecurityInfoA
SetNamedSecurityInfoA
RegQueryInfoKeyA
RegEnumKeyExA
RegOpenKeyExA
RegQueryValueExA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
RegDeleteKeyA
SHGetSpecialFolderPathA
CommandLineToArgvW
CoGetInterfaceAndReleaseStream
CoCreateInstance
CoMarshalInterThreadInterfaceInStream
CoInitialize
CoUninitialize
VariantClear
SysStringLen
LoadRegTypeLi
SysAllocString
SysFreeString
??2@YAPAXI@Z
_stricmp
_strlwr
_adjust_fdiv
malloc
_initterm
free
atoi
strcmp
strncmp
strchr
strncpy
_purecall
strcpy
_wcslwr
wcsstr
_access
strcat
memset
sprintf
??3@YAXPAX@Z
strstr
memcmp
memcpy
fclose
fread
_strupr
ftell
fseek
fopen
strrchr
strlen
SHSetValueA
SHDeleteValueA
SHDeleteKeyA
DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ