DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
831ae86198d19392fd6a9b22d6b75c72_JaffaCakes118.dll
Resource
win7-20240705-en
Target
831ae86198d19392fd6a9b22d6b75c72_JaffaCakes118
Size
60KB
MD5
831ae86198d19392fd6a9b22d6b75c72
SHA1
02482e71ab1d603f90c6e706082c6cccfde5286c
SHA256
392e853d041838eac940ce4ee83cdecd07e4924b01db5e2c8dedf8b0e6e929fa
SHA512
2925b020d51f346f4ce8b763c88c526bab2e726ddbd856853698ee6468a6ffc4a0b4a7f9ec344d5393ac3f1a970035f2803975fe98e558ae75348512599e6de5
SSDEEP
1536:4pw3LO9sNmrEh7b/zOkQolWwWHaUOviH+wQrl/D:YwrH2HyqewYl
Checks for missing Authenticode signature.
resource |
---|
831ae86198d19392fd6a9b22d6b75c72_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
LocalFree
CloseHandle
Process32Next
Process32First
GetProcAddress
LoadLibraryA
MoveFileA
SetFileAttributesA
Sleep
CreateThread
FreeLibrary
GetCommandLineW
WideCharToMultiByte
CreateProcessA
GetSystemDirectoryA
RemoveDirectoryA
FindNextFileA
GetPrivateProfileStringA
FindFirstFileA
CreateDirectoryA
ExitProcess
GetExitCodeProcess
WaitForSingleObject
GetModuleHandleA
GetShortPathNameA
lstrlenA
MultiByteToWideChar
lstrlenW
HeapDestroy
InterlockedDecrement
EnterCriticalSection
InterlockedIncrement
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
DisableThreadLibraryCalls
GetCurrentProcessId
WritePrivateProfileStringA
DeleteFileA
GetModuleFileNameA
RegCreateKeyExA
RegSetValueExA
GetNamedSecurityInfoA
BuildExplicitAccessWithNameA
SetEntriesInAclA
SetNamedSecurityInfoA
RegOpenKeyExA
RegQueryInfoKeyA
RegEnumKeyExA
RegDeleteKeyA
RegCloseKey
RegQueryValueExA
CommandLineToArgvW
SHGetSpecialFolderPathA
CoInitialize
CoUninitialize
CoGetInterfaceAndReleaseStream
CoMarshalInterThreadInterfaceInStream
CoCreateInstance
SysAllocString
VariantClear
SysStringLen
LoadRegTypeLi
SysFreeString
sprintf
_strupr
_stricmp
_adjust_fdiv
malloc
_initterm
free
_access
strncmp
strncpy
_wcslwr
wcsstr
strcpy
strlen
strchr
atoi
??3@YAXPAX@Z
fclose
fread
memset
??2@YAPAXI@Z
ftell
fseek
fopen
strcat
strrchr
_strlwr
strcmp
strstr
memcpy
_purecall
memcmp
SHSetValueA
SHDeleteKeyA
SHDeleteValueA
DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ