DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
7874d51ef60c07c20573911f415cf76e_JaffaCakes118.dll
Resource
win7-20240729-en
Target
7874d51ef60c07c20573911f415cf76e_JaffaCakes118
Size
76KB
MD5
7874d51ef60c07c20573911f415cf76e
SHA1
33e47b907ffef6252b0eeeda46a6bfd2d3ed8df2
SHA256
22421ed5cbe30397e19d80b3f6a0c08795ed645621fb046e3391712cc1106aa7
SHA512
48871cad2d74131b040d949b954761eb5d64ff9762e2d123743e6e01163fa164abcf1d6b8e69d67f26f63d1d669c4aec2a5cdda3194f70130ecce673482278b0
SSDEEP
1536:VQ4TUY6I8yZHS5HvhNYibk/o/jAUkTaAs:S4Ch+ibzjkT1s
Checks for missing Authenticode signature.
resource |
---|
7874d51ef60c07c20573911f415cf76e_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
FreeLibrary
MultiByteToWideChar
lstrlenA
MoveFileA
SetFileAttributesA
WritePrivateProfileStringA
LocalFree
DisableThreadLibraryCalls
InitializeCriticalSection
GetSystemDirectoryA
LeaveCriticalSection
InterlockedIncrement
EnterCriticalSection
InterlockedDecrement
HeapDestroy
GetShortPathNameA
GetModuleHandleA
GetCurrentProcessId
RemoveDirectoryA
Process32Next
Process32First
GetCommandLineW
GetModuleFileNameA
CreateProcessA
WaitForSingleObject
GetExitCodeProcess
lstrlenW
WideCharToMultiByte
FindFirstFileA
GetPrivateProfileStringA
FindNextFileA
CloseHandle
LoadLibraryA
GetProcAddress
Sleep
CreateThread
CreateDirectoryA
DeleteFileA
ExitProcess
DeleteCriticalSection
RegDeleteKeyA
RegEnumKeyExA
RegCreateKeyExA
RegSetValueExA
RegQueryValueExA
RegCloseKey
GetNamedSecurityInfoA
BuildExplicitAccessWithNameA
SetEntriesInAclA
SetNamedSecurityInfoA
RegOpenKeyExA
RegQueryInfoKeyA
SHGetSpecialFolderPathA
CommandLineToArgvW
CoUninitialize
CoInitialize
CoCreateInstance
CoGetInterfaceAndReleaseStream
CoMarshalInterThreadInterfaceInStream
SysStringLen
LoadRegTypeLi
SysAllocString
VariantClear
SysFreeString
sprintf
_strlwr
_stricmp
_adjust_fdiv
malloc
_initterm
free
atoi
_purecall
memcpy
memcmp
strncmp
strchr
strncpy
strcmp
strcpy
??3@YAXPAX@Z
fclose
fread
memset
??2@YAPAXI@Z
ftell
fseek
fopen
strcat
strrchr
_strupr
_access
wcsstr
_wcslwr
strstr
strlen
SHSetValueA
SHDeleteKeyA
SHDeleteValueA
DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ