DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
71de023ab37db154921f3ec03a065822_JaffaCakes118.dll
Resource
win7-20240708-en
Target
71de023ab37db154921f3ec03a065822_JaffaCakes118
Size
72KB
MD5
71de023ab37db154921f3ec03a065822
SHA1
999364ccc8ec747ae554e16bc2f88afb9d33b632
SHA256
470944ca3d3eac446e461434a0f1e76c5d10a698694edb8a026dc8060d3a7c0a
SHA512
a6f76ae7922e66d3de4518b5c6da515ba735f80eb4d04c1d8d9c14c363e9ba9d0197a6c3f921b0e173554bd770df083fede1bcf9b358702c4ccf8df4286b9a34
SSDEEP
1536:uQCmYD47x/BJbNKQeKoGP82iNNOpfBDqEF6:ZCw7x5hTpfBI
Checks for missing Authenticode signature.
resource |
---|
71de023ab37db154921f3ec03a065822_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
DisableThreadLibraryCalls
InitializeCriticalSection
DeleteCriticalSection
LeaveCriticalSection
InterlockedIncrement
EnterCriticalSection
InterlockedDecrement
HeapDestroy
GetShortPathNameA
GetModuleHandleA
GetExitCodeProcess
CloseHandle
WaitForSingleObject
RemoveDirectoryA
ExitProcess
FreeLibrary
LoadLibraryA
Sleep
GetProcAddress
GetCommandLineW
Process32Next
Process32First
CreateDirectoryA
WritePrivateProfileStringA
CreateProcessA
GetModuleFileNameA
WideCharToMultiByte
lstrlenA
lstrlenW
CreateThread
GetCurrentProcessId
FindFirstFileA
GetPrivateProfileStringA
FindNextFileA
MultiByteToWideChar
DeleteFileA
MoveFileA
LocalFree
SetFileAttributesA
GetSystemDirectoryA
RegQueryInfoKeyA
RegOpenKeyExA
RegEnumKeyExA
BuildExplicitAccessWithNameA
SetEntriesInAclA
GetNamedSecurityInfoA
SetNamedSecurityInfoA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
RegQueryValueExA
RegDeleteKeyA
SHGetSpecialFolderPathA
CommandLineToArgvW
CoInitialize
CoUninitialize
CoGetInterfaceAndReleaseStream
CoMarshalInterThreadInterfaceInStream
CoCreateInstance
SysStringLen
LoadRegTypeLi
VariantClear
SysAllocString
SysFreeString
_access
_stricmp
_strlwr
_adjust_fdiv
malloc
_initterm
free
_wcslwr
wcsstr
atoi
strncmp
strchr
strncpy
fopen
fseek
ftell
??3@YAXPAX@Z
sprintf
strlen
strstr
strrchr
memcmp
memcpy
strcat
strcpy
memset
_strupr
_purecall
??2@YAPAXI@Z
strcmp
fclose
fread
SHSetValueA
SHDeleteKeyA
SHDeleteValueA
DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ