DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
8934b1aae73dec0ea3fbb3e8b287dfdb_JaffaCakes118.dll
Resource
win7-20240704-en
Target
8934b1aae73dec0ea3fbb3e8b287dfdb_JaffaCakes118
Size
52KB
MD5
8934b1aae73dec0ea3fbb3e8b287dfdb
SHA1
a6c271435cd8de835312e71b13762c0cc3a1c3bf
SHA256
9c96d8202995938fb92634c58054b102708b057f4398ae6d32167d5fbd9d40e9
SHA512
ed7275ba10a115834a11cdbca182fc6974e9e092f1b5e932e332ce43b7be8e993844d0c64cc1f793ef137b8ca4148a01cf9398fe74343fa85fad4108e06ff0ba
SSDEEP
1536:W2K7yJqdeMP2vjsR95dvCZ3q8HtUTy8WjuyEz3:xWh0M+IRY/ey8jyEz3
Checks for missing Authenticode signature.
resource |
---|
8934b1aae73dec0ea3fbb3e8b287dfdb_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
lstrlenA
WideCharToMultiByte
DisableThreadLibraryCalls
InitializeCriticalSection
DeleteCriticalSection
LeaveCriticalSection
InterlockedIncrement
EnterCriticalSection
InterlockedDecrement
HeapDestroy
GetShortPathNameA
GetModuleHandleA
FreeLibrary
GetProcAddress
LoadLibraryA
RemoveDirectoryA
FindNextFileA
GetPrivateProfileStringA
FindFirstFileA
ExitProcess
Process32Next
Process32First
CreateDirectoryA
GetCurrentProcessId
lstrlenW
GetCommandLineW
CreateThread
MultiByteToWideChar
DeleteFileA
MoveFileA
Sleep
GetSystemDirectoryA
GetModuleFileNameA
CreateProcessA
WaitForSingleObject
CloseHandle
GetExitCodeProcess
LocalFree
SetFileAttributesA
WritePrivateProfileStringA
RegQueryValueExA
RegOpenKeyExA
RegQueryInfoKeyA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
BuildExplicitAccessWithNameA
SetEntriesInAclA
GetNamedSecurityInfoA
SetNamedSecurityInfoA
RegEnumKeyExA
RegDeleteKeyA
SHGetSpecialFolderPathA
CommandLineToArgvW
CoInitialize
CoUninitialize
CoGetInterfaceAndReleaseStream
CoMarshalInterThreadInterfaceInStream
CoCreateInstance
VariantClear
SysStringLen
LoadRegTypeLi
SysAllocString
SysFreeString
wcsstr
_stricmp
_strlwr
_adjust_fdiv
malloc
_initterm
free
atoi
strcmp
_access
_purecall
strrchr
fopen
fseek
ftell
??2@YAPAXI@Z
memset
sprintf
strstr
strncpy
strchr
strncmp
strlen
strcpy
??3@YAXPAX@Z
strcat
_strupr
_wcslwr
memcmp
memcpy
fclose
fread
SHDeleteValueA
SHDeleteKeyA
SHSetValueA
DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ