DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
4b53aa969deb196ccfacda5e9081aaa1_JaffaCakes118.dll
Resource
win7-20240705-en
Target
4b53aa969deb196ccfacda5e9081aaa1_JaffaCakes118
Size
52KB
MD5
4b53aa969deb196ccfacda5e9081aaa1
SHA1
14d9fa31a5d18e33729ef0e2dd3fa141cb00eb06
SHA256
41e76bb77ec389ec67fd99886c6748c3cfa159d5d395aed49c2c6d24b445f070
SHA512
f2f81efc4b402523bdf74bbb6d45464a848abb6b500f03faa3ec9d640d047e37e23a88240927798209494a285cba121800ee64052bc383bbe01595c7f1645a4a
SSDEEP
1536:wWJo3n7s8vDITqFi0rzF5ITeMfYgzTyK3:TC3n7s8dQvTpfYe3
Checks for missing Authenticode signature.
resource |
---|
4b53aa969deb196ccfacda5e9081aaa1_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
CreateThread
CreateProcessA
GetSystemDirectoryA
Sleep
GetCommandLineW
RemoveDirectoryA
GetExitCodeProcess
WaitForSingleObject
WritePrivateProfileStringA
Process32Next
Process32First
GetCurrentProcessId
DisableThreadLibraryCalls
InitializeCriticalSection
DeleteCriticalSection
LeaveCriticalSection
InterlockedIncrement
EnterCriticalSection
InterlockedDecrement
HeapDestroy
GetShortPathNameA
GetModuleHandleA
MoveFileA
CreateDirectoryA
LocalFree
GetModuleFileNameA
WideCharToMultiByte
lstrlenA
MultiByteToWideChar
lstrlenW
GetProcAddress
CloseHandle
FindFirstFileA
GetPrivateProfileStringA
SetFileAttributesA
DeleteFileA
FindNextFileA
FreeLibrary
LoadLibraryA
ExitProcess
RegDeleteKeyA
RegEnumKeyExA
RegQueryValueExA
RegCloseKey
GetNamedSecurityInfoA
BuildExplicitAccessWithNameA
SetEntriesInAclA
SetNamedSecurityInfoA
RegOpenKeyExA
RegQueryInfoKeyA
RegCreateKeyExA
RegSetValueExA
SHGetSpecialFolderPathA
CommandLineToArgvW
CoMarshalInterThreadInterfaceInStream
CoGetInterfaceAndReleaseStream
CoInitialize
CoUninitialize
CoCreateInstance
SysStringLen
LoadRegTypeLi
VariantClear
SysAllocString
SysFreeString
fclose
_strlwr
_strupr
_adjust_fdiv
malloc
_initterm
free
strcmp
_purecall
strncmp
strncpy
strchr
atoi
_access
_wcslwr
wcsstr
strstr
memset
strrchr
sprintf
strcat
strlen
strcpy
??3@YAXPAX@Z
memcmp
memcpy
_stricmp
fread
??2@YAPAXI@Z
ftell
fseek
fopen
SHDeleteValueA
SHDeleteKeyA
SHSetValueA
DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ