DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
5ab861849dd83e3024a26bdbe57a2087_JaffaCakes118.dll
Resource
win7-20240704-en
Target
5ab861849dd83e3024a26bdbe57a2087_JaffaCakes118
Size
36KB
MD5
5ab861849dd83e3024a26bdbe57a2087
SHA1
fcefc16409d5eab519f4f9258967a6a5c5cb5fa0
SHA256
22ac3ac46da952db4f6671d67d24d65856396c5178c99f01b216e46560a20d27
SHA512
86d5424bec0890f3688550344fb3da47d02c6db05bc0035f4edd37eff7217f7146305909964970e16d5eee0b57fa47fb82bde08240ea91aec0cb0957a30132b2
SSDEEP
768:/cbtQSxHaX4gHZIexLadk7GZes7rw74UEgX7qsl:IQoin+umFHw743KqC
Checks for missing Authenticode signature.
resource |
---|
5ab861849dd83e3024a26bdbe57a2087_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Sleep
MoveFileA
DeleteFileA
SetFileAttributesA
CloseHandle
Process32Next
Process32First
CreateToolhelp32Snapshot
ExitProcess
GetCommandLineW
GetCurrentProcessId
DisableThreadLibraryCalls
InitializeCriticalSection
FindFirstFileA
LeaveCriticalSection
InterlockedIncrement
EnterCriticalSection
InterlockedDecrement
HeapDestroy
GetShortPathNameA
GetModuleFileNameA
GetExitCodeProcess
WaitForSingleObject
CreateProcessA
GetSystemDirectoryA
FindNextFileA
lstrlenA
MultiByteToWideChar
LoadLibraryA
FreeLibrary
lstrlenW
WideCharToMultiByte
DeleteCriticalSection
CreateThread
IsWindow
SetWindowTextA
SendMessageA
FindWindowExA
RegCloseKey
RegEnumKeyExA
RegQueryInfoKeyA
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
RegCreateKeyExA
RegDeleteKeyA
CommandLineToArgvW
SHGetSpecialFolderPathA
CoCreateInstance
CoInitialize
SysStringLen
LoadRegTypeLi
VariantClear
SysAllocString
SysFreeString
_strlwr
_stricmp
_strupr
_adjust_fdiv
malloc
_initterm
free
strstr
memset
memcmp
??2@YAPAXI@Z
_purecall
memcpy
strcpy
strcat
strrchr
sprintf
strlen
??3@YAXPAX@Z
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ