DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
64708e701cb3dd8c0b9ffa070dbca766_JaffaCakes118.dll
Resource
win7-20240705-en
Target
64708e701cb3dd8c0b9ffa070dbca766_JaffaCakes118
Size
52KB
MD5
64708e701cb3dd8c0b9ffa070dbca766
SHA1
a2d2e6f804ef5ac09082eaab85449020a8ebb771
SHA256
790583217a411233f5d023fc8d6a072b51ba6ba876955217ba1a0bcd023cac6e
SHA512
7f6210b730c14f6422387d7b863359422afb23a1335fdd29fdff4d5044f8e88e46664334bafa183f3f63303609125b7d4b2f9c38e5bebcf439dfde49a535b101
SSDEEP
1536:fuUfpcH5mkR8i4q3Roj+xqG3cjw6v6kNLckXLPCoxNnmVig:Jf0RZBXqSkNAKCoxAVig
Checks for missing Authenticode signature.
resource |
---|
64708e701cb3dd8c0b9ffa070dbca766_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetExitCodeProcess
WaitForSingleObject
CreateProcessA
GetSystemDirectoryA
MultiByteToWideChar
lstrlenA
LeaveCriticalSection
EnterCriticalSection
GetCommandLineW
RemoveDirectoryA
GetModuleFileNameA
DisableThreadLibraryCalls
InitializeCriticalSection
DeleteCriticalSection
InterlockedIncrement
InterlockedDecrement
HeapDestroy
GetShortPathNameA
GetModuleHandleA
CreateDirectoryA
GetCurrentProcessId
MoveFileA
WritePrivateProfileStringA
FindFirstFileA
GetPrivateProfileStringA
DeleteFileA
FindNextFileA
Process32First
Process32Next
CloseHandle
lstrlenW
WideCharToMultiByte
ExitProcess
SetFileAttributesA
GetProcAddress
LoadLibraryA
FreeLibrary
LocalFree
Sleep
CreateThread
RegDeleteKeyA
RegQueryValueExA
GetNamedSecurityInfoA
BuildExplicitAccessWithNameA
SetEntriesInAclA
SetNamedSecurityInfoA
RegOpenKeyExA
RegQueryInfoKeyA
RegEnumKeyExA
RegCloseKey
RegCreateKeyExA
RegSetValueExA
SHGetSpecialFolderPathA
CommandLineToArgvW
CoUninitialize
CoInitialize
CoCreateInstance
CoGetInterfaceAndReleaseStream
CoMarshalInterThreadInterfaceInStream
SysStringLen
LoadRegTypeLi
SysAllocString
VariantClear
SysFreeString
atoi
_stricmp
_strlwr
_adjust_fdiv
malloc
_initterm
free
_purecall
fopen
fseek
ftell
??2@YAPAXI@Z
fread
fclose
memcpy
memcmp
??3@YAXPAX@Z
wcsstr
_wcslwr
sprintf
strncpy
strchr
memset
strncmp
strlen
strcpy
_strupr
strstr
strrchr
strcat
strcmp
_access
SHDeleteValueA
SHSetValueA
SHDeleteKeyA
DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ