DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
879cf64ec7028ef1aef526d186130940_JaffaCakes118.dll
Resource
win7-20240729-en
Target
879cf64ec7028ef1aef526d186130940_JaffaCakes118
Size
80KB
MD5
879cf64ec7028ef1aef526d186130940
SHA1
633154328466dcb4031b43b2aa4008b424e7271c
SHA256
09fb3b99ad4ae127017ae7febaee7ae1372d72bd86ddd8909bda8d3241661610
SHA512
9f48edb33e275d9caef4a12c6ef73baa3d4bbd1e6f272b65c5f8c6933b0896c59f85a89327960ba06eacac930e2c55e923b8641326dafd20169f95e8886aae00
SSDEEP
1536:as5Dvk09cCZIfKDNQlhDTCubmxk/SV0sBAMJBa6OtU:7D5HIfKuTXCwS6MJBa6Om
Checks for missing Authenticode signature.
resource |
---|
879cf64ec7028ef1aef526d186130940_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetCommandLineW
ExitProcess
FreeLibrary
CreateDirectoryA
DisableThreadLibraryCalls
InitializeCriticalSection
DeleteCriticalSection
LeaveCriticalSection
InterlockedIncrement
EnterCriticalSection
InterlockedDecrement
HeapDestroy
GetShortPathNameA
CreateThread
GetCurrentProcessId
GetExitCodeProcess
WaitForSingleObject
CreateProcessA
GetSystemDirectoryA
FindNextFileA
DeleteFileA
GetPrivateProfileStringA
FindFirstFileA
WritePrivateProfileStringA
MoveFileA
RemoveDirectoryA
Sleep
LoadLibraryA
GetProcAddress
SetFileAttributesA
Process32First
Process32Next
CloseHandle
LocalFree
GetModuleFileNameA
WideCharToMultiByte
lstrlenA
MultiByteToWideChar
lstrlenW
GetModuleHandleA
RegDeleteKeyA
RegCreateKeyExA
RegSetValueExA
RegEnumKeyExA
BuildExplicitAccessWithNameA
SetEntriesInAclA
GetNamedSecurityInfoA
SetNamedSecurityInfoA
RegQueryInfoKeyA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
SHGetSpecialFolderPathA
CommandLineToArgvW
CoUninitialize
CoInitialize
CoMarshalInterThreadInterfaceInStream
CoGetInterfaceAndReleaseStream
CoCreateInstance
VariantClear
SysStringLen
LoadRegTypeLi
SysAllocString
SysFreeString
_wcslwr
_strlwr
_stricmp
_adjust_fdiv
malloc
_initterm
free
strcmp
atoi
strncmp
strchr
strncpy
fopen
fseek
ftell
fread
??3@YAXPAX@Z
memcmp
memcpy
strcpy
sprintf
strlen
memset
strcat
strstr
wcsstr
_strupr
_access
_purecall
??2@YAPAXI@Z
strrchr
fclose
SHDeleteValueA
SHDeleteKeyA
SHSetValueA
DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ