DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
61e51aa6e250db84ef1919e487ffeef4_JaffaCakes118.dll
Resource
win7-20240708-en
Target
61e51aa6e250db84ef1919e487ffeef4_JaffaCakes118
Size
64KB
MD5
61e51aa6e250db84ef1919e487ffeef4
SHA1
251cac0b6f59a463cb3268896b55b77c332edca9
SHA256
19fbcb7628af0e895d4e68aca07177a581d3a744e50f5a35e3d83c4a72879fc9
SHA512
bce29856b057a40dbe9f5fe2003c777f7324c408106564c8862dbffcfd49977ddaf73a696eddb45fe172ee0d6a6821b13de6a000f37aecd0a6aab74ec76cbc39
SSDEEP
1536:wuioKHZxVUA2JNh3SeHaqhx7ELGWkroJaiK7+29MPr8:TKHZxt8NxxhxTPi8+29K
Checks for missing Authenticode signature.
resource |
---|
61e51aa6e250db84ef1919e487ffeef4_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
LocalFree
MoveFileA
DeleteFileA
SetFileAttributesA
WideCharToMultiByte
GetProcAddress
FindNextFileA
GetPrivateProfileStringA
FindFirstFileA
WritePrivateProfileStringA
GetCurrentProcessId
CreateThread
CreateProcessA
GetSystemDirectoryA
GetExitCodeProcess
WaitForSingleObject
RemoveDirectoryA
GetCommandLineW
ExitProcess
Process32Next
Process32First
Sleep
GetModuleFileNameA
GetModuleHandleA
GetShortPathNameA
lstrlenA
MultiByteToWideChar
lstrlenW
HeapDestroy
InterlockedDecrement
InterlockedIncrement
DeleteCriticalSection
InitializeCriticalSection
DisableThreadLibraryCalls
EnterCriticalSection
LeaveCriticalSection
LoadLibraryA
CreateDirectoryA
FreeLibrary
CloseHandle
GetNamedSecurityInfoA
BuildExplicitAccessWithNameA
SetEntriesInAclA
SetNamedSecurityInfoA
RegQueryInfoKeyA
RegEnumKeyExA
RegOpenKeyExA
RegQueryValueExA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
RegDeleteKeyA
SHGetSpecialFolderPathA
CommandLineToArgvW
CoMarshalInterThreadInterfaceInStream
CoUninitialize
CoGetInterfaceAndReleaseStream
CoInitialize
CoCreateInstance
VariantClear
SysAllocString
SysStringLen
LoadRegTypeLi
SysFreeString
wcsstr
_strupr
_strlwr
_adjust_fdiv
malloc
_initterm
free
strncmp
strncpy
fopen
fseek
ftell
fread
fclose
strcpy
strcmp
_access
strcat
sprintf
??3@YAXPAX@Z
memcpy
_purecall
??2@YAPAXI@Z
memcmp
atoi
strchr
_stricmp
_wcslwr
strlen
strstr
memset
strrchr
SHSetValueA
SHDeleteValueA
SHDeleteKeyA
DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ