DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
85042ccd4a05de76deee95790101e374_JaffaCakes118.dll
Resource
win7-20240729-en
Target
85042ccd4a05de76deee95790101e374_JaffaCakes118
Size
52KB
MD5
85042ccd4a05de76deee95790101e374
SHA1
49d8b3a64c685ed566d89e7544bd1faf0679e298
SHA256
56d617a25c2924e884b58e315ca25ebf0fcf3021fa4d2f55cb400240b3db3568
SHA512
a6ce88bfdb7d94b6be7b78ff1f5f859f02d2ea72aab077455a3d3dbc451ec0d72596f75a24404bd1f0e3be67556d6ff228c9264ceb0e9519d6f0d11c786ed225
SSDEEP
1536:zvEMBDBqVJhHfNqjkoiZhKnYvQInQ0v/634Nxc:8HYjiZZvQInQ0va4N
Checks for missing Authenticode signature.
resource |
---|
85042ccd4a05de76deee95790101e374_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
EnterCriticalSection
CreateThread
MoveFileA
SetFileAttributesA
MultiByteToWideChar
lstrlenA
GetProcAddress
Sleep
WritePrivateProfileStringA
LeaveCriticalSection
GetExitCodeProcess
WaitForSingleObject
GetSystemDirectoryA
DisableThreadLibraryCalls
InitializeCriticalSection
DeleteCriticalSection
InterlockedIncrement
InterlockedDecrement
HeapDestroy
GetShortPathNameA
GetModuleHandleA
GetCurrentProcessId
CreateDirectoryA
GetModuleFileNameA
ExitProcess
Process32First
Process32Next
CloseHandle
LoadLibraryA
FreeLibrary
lstrlenW
WideCharToMultiByte
FindFirstFileA
GetPrivateProfileStringA
FindNextFileA
DeleteFileA
RemoveDirectoryA
LocalFree
CreateProcessA
GetCommandLineW
RegEnumKeyExA
RegQueryInfoKeyA
RegDeleteKeyA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
GetNamedSecurityInfoA
BuildExplicitAccessWithNameA
SetEntriesInAclA
SetNamedSecurityInfoA
RegCreateKeyExA
RegSetValueExA
SHGetSpecialFolderPathA
CommandLineToArgvW
CoCreateInstance
CoUninitialize
CoGetInterfaceAndReleaseStream
CoInitialize
CoMarshalInterThreadInterfaceInStream
SysStringLen
LoadRegTypeLi
SysAllocString
VariantClear
SysFreeString
fread
_stricmp
_strlwr
_adjust_fdiv
malloc
_initterm
free
_purecall
memcpy
atoi
_wcslwr
wcsstr
strncmp
strchr
strncpy
memcmp
memset
strcat
strcpy
_access
sprintf
??3@YAXPAX@Z
strstr
strrchr
strlen
fclose
_strupr
??2@YAPAXI@Z
ftell
fseek
fopen
strcmp
SHSetValueA
SHDeleteKeyA
SHDeleteValueA
DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ