DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
5a13d2c36b7cf5f375fcd01c61a704d2_JaffaCakes118.dll
Resource
win7-20240708-en
Target
5a13d2c36b7cf5f375fcd01c61a704d2_JaffaCakes118
Size
60KB
MD5
5a13d2c36b7cf5f375fcd01c61a704d2
SHA1
b0ee094c77a8e706e1c515043fce4b6f1d7756dd
SHA256
01bdff49e031a494658af379d1828dd95bf774cc896afbabaf46d4959c1c9fea
SHA512
66a7ce1d0dc4209944bb91823d0c4b6772002fabb9bd48a522862171a5b8e989df8001008784360abea308207a53c9728a5b3d82fe7bf9897b6e1da39f2182fc
SSDEEP
1536:UaFSJdNV2qT40wTrXA5TzJfh1CUXqXTij9tB4:vEtIA5TzNfCTirK
Checks for missing Authenticode signature.
resource |
---|
5a13d2c36b7cf5f375fcd01c61a704d2_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
FreeLibrary
GetCommandLineW
ExitProcess
FindNextFileA
GetPrivateProfileStringA
FindFirstFileA
WritePrivateProfileStringA
CreateThread
CreateDirectoryA
Sleep
WaitForSingleObject
CreateProcessA
GetSystemDirectoryA
DisableThreadLibraryCalls
InitializeCriticalSection
DeleteCriticalSection
InterlockedIncrement
InterlockedDecrement
HeapDestroy
GetShortPathNameA
GetModuleHandleA
RemoveDirectoryA
lstrlenA
lstrlenW
WideCharToMultiByte
LoadLibraryA
GetProcAddress
MultiByteToWideChar
SetFileAttributesA
DeleteFileA
MoveFileA
EnterCriticalSection
LeaveCriticalSection
GetModuleFileNameA
GetCurrentProcessId
Process32First
Process32Next
LocalFree
CloseHandle
GetExitCodeProcess
RegCreateKeyExA
RegSetValueExA
RegOpenKeyExA
RegQueryInfoKeyA
RegEnumKeyExA
RegDeleteKeyA
RegCloseKey
GetNamedSecurityInfoA
BuildExplicitAccessWithNameA
SetEntriesInAclA
SetNamedSecurityInfoA
RegQueryValueExA
SHGetSpecialFolderPathA
CommandLineToArgvW
CoInitialize
CoUninitialize
CoGetInterfaceAndReleaseStream
CoMarshalInterThreadInterfaceInStream
CoCreateInstance
SysStringLen
LoadRegTypeLi
SysAllocString
VariantClear
SysFreeString
_wcslwr
_stricmp
_strlwr
_adjust_fdiv
malloc
_initterm
free
atoi
_purecall
strncmp
strchr
strncpy
fopen
fseek
ftell
fread
strstr
memset
strcpy
strcmp
strrchr
??3@YAXPAX@Z
sprintf
??2@YAPAXI@Z
strlen
wcsstr
_strupr
strcat
_access
memcmp
memcpy
fclose
SHDeleteValueA
SHSetValueA
SHDeleteKeyA
DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ