DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
652c6ca74fdd442c69ed4d451a986bfb_JaffaCakes118.dll
Resource
win7-20240708-en
Target
652c6ca74fdd442c69ed4d451a986bfb_JaffaCakes118
Size
72KB
MD5
652c6ca74fdd442c69ed4d451a986bfb
SHA1
7e127fde780c3a9c806816b690da03fbfd872cdc
SHA256
7f9204ce5a5b85bb2b55688b6009908d560de5ad9eadc5b05835acebb6062f0d
SHA512
564ce06dba3a27b65b696a1808211935c66b1a82fe8147becd6450d79f485e74bb4bea42d0f6aa84781d33048bedcc3b7583b99f41df0bbac32a98dc61790783
SSDEEP
1536:q+dPcNCCKLGOPKfn71+83Fj08n+W5TeXafb:HcgKwsNek
Checks for missing Authenticode signature.
resource |
---|
652c6ca74fdd442c69ed4d451a986bfb_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
LeaveCriticalSection
InterlockedIncrement
EnterCriticalSection
InterlockedDecrement
HeapDestroy
lstrlenW
lstrlenA
GetShortPathNameA
GetModuleHandleA
GetProcAddress
GetCommandLineW
DeleteCriticalSection
CloseHandle
CreateProcessA
RemoveDirectoryA
Sleep
CreateThread
Process32Next
Process32First
GetExitCodeProcess
WaitForSingleObject
GetSystemDirectoryA
InitializeCriticalSection
DisableThreadLibraryCalls
CreateDirectoryA
WritePrivateProfileStringA
GetModuleFileNameA
LoadLibraryA
FreeLibrary
GetCurrentProcessId
ExitProcess
MultiByteToWideChar
MoveFileA
FindFirstFileA
GetPrivateProfileStringA
SetFileAttributesA
DeleteFileA
LocalFree
FindNextFileA
WideCharToMultiByte
RegQueryInfoKeyA
RegCreateKeyExA
RegSetValueExA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
GetNamedSecurityInfoA
BuildExplicitAccessWithNameA
SetEntriesInAclA
SetNamedSecurityInfoA
RegEnumKeyExA
RegDeleteKeyA
SHGetSpecialFolderPathA
CommandLineToArgvW
CoInitialize
CoGetInterfaceAndReleaseStream
CoMarshalInterThreadInterfaceInStream
CoUninitialize
CoCreateInstance
SysAllocString
VariantClear
SysStringLen
LoadRegTypeLi
SysFreeString
memcpy
_strlwr
_strupr
_adjust_fdiv
malloc
_initterm
free
strcmp
fopen
fseek
ftell
fread
fclose
strncmp
strncpy
strcpy
memset
strstr
strrchr
sprintf
strcat
strlen
??3@YAXPAX@Z
wcsstr
_wcslwr
_access
_stricmp
_purecall
??2@YAPAXI@Z
memcmp
atoi
strchr
SHDeleteValueA
SHDeleteKeyA
SHSetValueA
DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ