DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
8ae5406629da679795cfed41bc3a059c_JaffaCakes118.dll
Resource
win7-20240708-en
Target
8ae5406629da679795cfed41bc3a059c_JaffaCakes118
Size
76KB
MD5
8ae5406629da679795cfed41bc3a059c
SHA1
0accb12d99ba14fc73132248df5580612422d360
SHA256
16276a2c46eb4bd778ff4de7d0882ebfe5fc0f5d48b4ce14207e752b210e8c63
SHA512
2ea25c12c17b3a781b56147b528bc1e0a1add20331d1e1a7dec949ca4c343fe0ae6a30518832c959d6a8282fae33031f268c0ed1c242696e26e9d04cd84c9bee
SSDEEP
1536:QdAUwy+tfP/pfXHtgLx5A2Q+FRpx/WN+:Pn1HMFTx+N+
Checks for missing Authenticode signature.
resource |
---|
8ae5406629da679795cfed41bc3a059c_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
LoadLibraryA
GetExitCodeProcess
WaitForSingleObject
GetSystemDirectoryA
SetFileAttributesA
LeaveCriticalSection
EnterCriticalSection
LocalFree
GetCommandLineW
CreateThread
GetProcAddress
FreeLibrary
InitializeCriticalSection
DeleteCriticalSection
InterlockedIncrement
InterlockedDecrement
HeapDestroy
GetShortPathNameA
GetModuleHandleA
ExitProcess
Process32Next
Process32First
MoveFileA
GetCurrentProcessId
CloseHandle
Sleep
WritePrivateProfileStringA
FindFirstFileA
GetPrivateProfileStringA
FindNextFileA
WideCharToMultiByte
lstrlenA
MultiByteToWideChar
lstrlenW
DeleteFileA
RemoveDirectoryA
CreateProcessA
CreateDirectoryA
GetModuleFileNameA
DisableThreadLibraryCalls
GetNamedSecurityInfoA
SetEntriesInAclA
SetNamedSecurityInfoA
RegCreateKeyExA
RegSetValueExA
RegDeleteKeyA
RegOpenKeyExA
RegQueryInfoKeyA
RegEnumKeyExA
RegCloseKey
RegQueryValueExA
BuildExplicitAccessWithNameA
SHGetSpecialFolderPathA
CommandLineToArgvW
CoUninitialize
CoInitialize
CoMarshalInterThreadInterfaceInStream
CoGetInterfaceAndReleaseStream
CoCreateInstance
SysStringLen
LoadRegTypeLi
VariantClear
SysAllocString
SysFreeString
strstr
_stricmp
_strupr
_adjust_fdiv
malloc
_initterm
free
atoi
_purecall
strncmp
strchr
strncpy
fopen
fseek
ftell
fread
??3@YAXPAX@Z
_access
strcat
strcmp
strrchr
sprintf
strcpy
memset
memcmp
memcpy
_strlwr
??2@YAPAXI@Z
strlen
wcsstr
_wcslwr
fclose
SHDeleteValueA
SHSetValueA
SHDeleteKeyA
DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ