DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
84f8a35f04f2e9fd8a1b1f08954cb738_JaffaCakes118.dll
Resource
win7-20240705-en
Target
84f8a35f04f2e9fd8a1b1f08954cb738_JaffaCakes118
Size
52KB
MD5
84f8a35f04f2e9fd8a1b1f08954cb738
SHA1
3836331d58f56d44258073976e669bec330b5574
SHA256
39c40e19b9b5929c16c0c4f2099694bdaf73a990923502ed67b590aef23f7e9a
SHA512
5c3ffd608877929a0ecbe39717a7dafa8765ab4660ec8ee7cdd9ac2ad000d9bfb446f06bc30a2c875c5c4a16b40be143eda09e9946255b568037b71ce939b665
SSDEEP
1536:MjYx6sWxOiX6X+dM1JP+aKN+raxGAnHKkBoiJ8bGnz9:Mjiq+VmrGXbGz
Checks for missing Authenticode signature.
resource |
---|
84f8a35f04f2e9fd8a1b1f08954cb738_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
CloseHandle
WaitForSingleObject
GetModuleFileNameA
GetSystemDirectoryA
GetCurrentProcessId
ExitProcess
MultiByteToWideChar
lstrlenA
Process32Next
Process32First
WideCharToMultiByte
GetExitCodeProcess
DisableThreadLibraryCalls
InitializeCriticalSection
DeleteCriticalSection
InterlockedIncrement
InterlockedDecrement
HeapDestroy
GetShortPathNameA
GetModuleHandleA
MoveFileA
GetCommandLineW
CreateThread
WritePrivateProfileStringA
RemoveDirectoryA
CreateProcessA
Sleep
EnterCriticalSection
LeaveCriticalSection
FindFirstFileA
GetPrivateProfileStringA
DeleteFileA
FindNextFileA
FreeLibrary
CreateDirectoryA
LoadLibraryA
GetProcAddress
LocalFree
SetFileAttributesA
lstrlenW
RegQueryValueExA
RegSetValueExA
RegOpenKeyExA
RegQueryInfoKeyA
RegEnumKeyExA
RegCloseKey
BuildExplicitAccessWithNameA
SetEntriesInAclA
GetNamedSecurityInfoA
SetNamedSecurityInfoA
RegDeleteKeyA
RegCreateKeyExA
SHGetSpecialFolderPathA
CommandLineToArgvW
CoGetInterfaceAndReleaseStream
CoCreateInstance
CoMarshalInterThreadInterfaceInStream
CoInitialize
CoUninitialize
SysStringLen
LoadRegTypeLi
SysAllocString
VariantClear
SysFreeString
strchr
_strupr
_strlwr
_adjust_fdiv
malloc
_initterm
free
_purecall
memcpy
memcmp
strcmp
fopen
fseek
ftell
??2@YAPAXI@Z
fread
??3@YAXPAX@Z
sprintf
strstr
_access
strcat
memset
strrchr
wcsstr
_wcslwr
atoi
_stricmp
strncpy
strncmp
strlen
strcpy
fclose
SHSetValueA
SHDeleteValueA
SHDeleteKeyA
DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ