DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
63a4ddb622e296ffb148524aa4d0a61c_JaffaCakes118.dll
Resource
win7-20240704-en
Target
63a4ddb622e296ffb148524aa4d0a61c_JaffaCakes118
Size
52KB
MD5
63a4ddb622e296ffb148524aa4d0a61c
SHA1
e4122dc43423c6f5c582f9c8c74cb40562255e84
SHA256
1ef452cce6aca0a4cd2a831b7c917eeefe1034b1b1b800fed26c98471a6621f3
SHA512
0902710b529fc368757b814b0d341bdded6ef6615be5243b6ffd63f86e8e46cf17ede34042a62b57f820ef8b978d21a5f12d08c74dbeb5de548966ec9493587e
SSDEEP
1536:qjx0y67mL7TGtxTKWkf2yeEFuhLLf0O+ilkD:qt40itVKWkzeES7v3kD
Checks for missing Authenticode signature.
resource |
---|
63a4ddb622e296ffb148524aa4d0a61c_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
LocalFree
GetCurrentProcessId
WritePrivateProfileStringA
DisableThreadLibraryCalls
InitializeCriticalSection
DeleteCriticalSection
LeaveCriticalSection
InterlockedIncrement
EnterCriticalSection
InterlockedDecrement
HeapDestroy
GetShortPathNameA
GetModuleHandleA
Sleep
CreateDirectoryA
CloseHandle
Process32Next
Process32First
CreateProcessA
RemoveDirectoryA
GetExitCodeProcess
WaitForSingleObject
GetSystemDirectoryA
MoveFileA
CreateThread
FindFirstFileA
GetPrivateProfileStringA
SetFileAttributesA
DeleteFileA
FindNextFileA
GetCommandLineW
GetModuleFileNameA
lstrlenW
WideCharToMultiByte
lstrlenA
MultiByteToWideChar
LoadLibraryA
GetProcAddress
ExitProcess
FreeLibrary
RegCreateKeyExA
RegSetValueExA
RegQueryValueExA
RegDeleteKeyA
BuildExplicitAccessWithNameA
SetEntriesInAclA
GetNamedSecurityInfoA
SetNamedSecurityInfoA
RegOpenKeyExA
RegQueryInfoKeyA
RegEnumKeyExA
RegCloseKey
CommandLineToArgvW
SHGetSpecialFolderPathA
CoUninitialize
CoInitialize
CoMarshalInterThreadInterfaceInStream
CoGetInterfaceAndReleaseStream
CoCreateInstance
VariantClear
SysStringLen
LoadRegTypeLi
SysAllocString
SysFreeString
??2@YAPAXI@Z
_strlwr
_strupr
_adjust_fdiv
malloc
_initterm
free
atoi
_wcslwr
wcsstr
strcmp
_access
_purecall
strcpy
strncmp
strchr
memcmp
??3@YAXPAX@Z
strstr
memset
strrchr
sprintf
strcat
memcpy
fclose
fread
_stricmp
ftell
fseek
fopen
strlen
strncpy
SHSetValueA
SHDeleteKeyA
SHDeleteValueA
DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ