DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
634e6243f38e8e5d6b6ea15421f4f0da_JaffaCakes118.dll
Resource
win7-20240704-en
Target
634e6243f38e8e5d6b6ea15421f4f0da_JaffaCakes118
Size
52KB
MD5
634e6243f38e8e5d6b6ea15421f4f0da
SHA1
f66d52fbcfcca3478697e02774e653c5cf19a7ee
SHA256
c63014e34b9e2d228b35f421139342217e0502e7b161427ca23a9e14a7891383
SHA512
b2f76de95a7ddcd93c4591e762eced9da572572f603c8ff50fd392b34752f529db184e65730c505c69714c861a01dd08f5d4bbca4a5280c33bb681881a51b7bd
SSDEEP
1536:9q0kS42b6MK/VHRvjuR++jtu6lPUVpE1U:aZH7vjuDc66Ey
Checks for missing Authenticode signature.
resource |
---|
634e6243f38e8e5d6b6ea15421f4f0da_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
WritePrivateProfileStringA
FindNextFileA
DeleteFileA
SetFileAttributesA
GetPrivateProfileStringA
FindFirstFileA
MoveFileA
DisableThreadLibraryCalls
InitializeCriticalSection
DeleteCriticalSection
LeaveCriticalSection
InterlockedIncrement
EnterCriticalSection
InterlockedDecrement
HeapDestroy
GetCurrentProcessId
GetModuleHandleA
LocalFree
Process32Next
Process32First
ExitProcess
CreateDirectoryA
CreateThread
CreateProcessA
GetSystemDirectoryA
GetExitCodeProcess
WaitForSingleObject
GetCommandLineW
GetModuleFileNameA
lstrlenW
WideCharToMultiByte
lstrlenA
MultiByteToWideChar
LoadLibraryA
GetProcAddress
FreeLibrary
CloseHandle
Sleep
GetShortPathNameA
RegSetValueExA
RegCreateKeyExA
GetNamedSecurityInfoA
BuildExplicitAccessWithNameA
SetEntriesInAclA
SetNamedSecurityInfoA
RegQueryInfoKeyA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
RegEnumKeyExA
RegDeleteKeyA
CommandLineToArgvW
SHGetSpecialFolderPathA
CoInitialize
CoGetInterfaceAndReleaseStream
CoMarshalInterThreadInterfaceInStream
CoUninitialize
CoCreateInstance
SysStringLen
LoadRegTypeLi
VariantClear
SysAllocString
SysFreeString
strncpy
_strlwr
_stricmp
_adjust_fdiv
malloc
_initterm
free
_access
strcmp
??2@YAPAXI@Z
_purecall
atoi
strrchr
strstr
memcpy
??3@YAXPAX@Z
wcsstr
_wcslwr
strlen
memset
strcat
strcpy
sprintf
_strupr
strchr
strncmp
memcmp
SHDeleteKeyA
SHSetValueA
DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ