DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
a0a052f44653df426dbef641dd4de857_JaffaCakes118.dll
Resource
win7-20240729-en
Target
a0a052f44653df426dbef641dd4de857_JaffaCakes118
Size
60KB
MD5
a0a052f44653df426dbef641dd4de857
SHA1
eb1baec359fe5c6102ab366cf6705aef50e458ec
SHA256
9211d1079004fa0799a16f3cc093b5d9b8331c7531a03cb47948a77beddd54e5
SHA512
d18267823c88a24c9bf73199ffc936eeb728a0f4a70be0e057206739ef1ca1b4fb095f016d6ab041ec1f6c4842359937e5344b8267e8ae1080e569e336ff67b3
SSDEEP
768:j5PZ7tSVwsHo0TODQhOtRVn92B39NLxTE5PTQBUtQ2bqM20/6q8Vt00l+B:Z3Go060MI39NLkPc+m10N8VRl+B
Checks for missing Authenticode signature.
resource |
---|
a0a052f44653df426dbef641dd4de857_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
CreateThread
LocalFree
CloseHandle
Process32Next
Process32First
GetProcAddress
DeleteFileA
CreateProcessA
RemoveDirectoryA
GetSystemDirectoryA
FindNextFileA
Sleep
FindFirstFileA
GetExitCodeProcess
WaitForSingleObject
GetCurrentProcessId
MoveFileA
SetFileAttributesA
ExitProcess
CreateDirectoryA
GetCommandLineW
WritePrivateProfileStringA
WideCharToMultiByte
LoadLibraryA
FreeLibrary
GetModuleFileNameA
GetModuleHandleA
GetShortPathNameA
lstrlenA
MultiByteToWideChar
lstrlenW
HeapDestroy
InterlockedDecrement
EnterCriticalSection
InterlockedIncrement
LeaveCriticalSection
DeleteCriticalSection
DisableThreadLibraryCalls
InitializeCriticalSection
GetPrivateProfileStringA
RegQueryValueExA
RegDeleteKeyA
RegEnumKeyExA
RegCloseKey
RegOpenKeyExA
RegQueryInfoKeyA
GetNamedSecurityInfoA
BuildExplicitAccessWithNameA
SetEntriesInAclA
SetNamedSecurityInfoA
RegCreateKeyExA
RegSetValueExA
SHGetSpecialFolderPathA
CommandLineToArgvW
CoUninitialize
CoInitialize
CoMarshalInterThreadInterfaceInStream
CoGetInterfaceAndReleaseStream
CoCreateInstance
VariantClear
SysAllocString
SysStringLen
LoadRegTypeLi
SysFreeString
strlen
_strlwr
_strupr
_adjust_fdiv
malloc
_initterm
free
_wcslwr
wcsstr
_access
fopen
fseek
ftell
fread
fclose
strncmp
memcpy
_purecall
??3@YAXPAX@Z
??2@YAPAXI@Z
memcmp
atoi
strchr
sprintf
strcmp
strrchr
_stricmp
memset
strstr
strcpy
strcat
strncpy
SHDeleteValueA
SHDeleteKeyA
SHSetValueA
DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ