DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
a2e57ed84089f0ed41bd692e035c375f_JaffaCakes118.dll
Resource
win7-20240708-en
Target
a2e57ed84089f0ed41bd692e035c375f_JaffaCakes118
Size
64KB
MD5
a2e57ed84089f0ed41bd692e035c375f
SHA1
4e09b1d5a6002d8937ef8334a7b77eb03106e6cd
SHA256
fdad458379106beb4f4f3716ea09bfd25234a1f777e7727c23aaa6fa5ae3946e
SHA512
8659aaad6ecc6b38e94ff16b63abaedad080ee03bd38a76568363bb34136e2281bf9488298421cf47bf3cf54ceffe05d0097eccabddb4a949e55d7e4324d6685
SSDEEP
1536:yawNLPSy0TFl8Hd4WqixjkXUV0BK6qNbMfQc:yLDZqdqm4
Checks for missing Authenticode signature.
resource |
---|
a2e57ed84089f0ed41bd692e035c375f_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetPrivateProfileStringA
FindFirstFileA
MoveFileA
CreateDirectoryA
Sleep
RemoveDirectoryA
WritePrivateProfileStringA
DisableThreadLibraryCalls
InitializeCriticalSection
DeleteCriticalSection
LeaveCriticalSection
DeleteFileA
EnterCriticalSection
InterlockedDecrement
HeapDestroy
GetShortPathNameA
GetModuleHandleA
GetCurrentProcessId
GetCommandLineW
GetExitCodeProcess
WaitForSingleObject
Process32Next
Process32First
CreateThread
FindNextFileA
lstrlenW
WideCharToMultiByte
lstrlenA
MultiByteToWideChar
GetProcAddress
LoadLibraryA
FreeLibrary
GetSystemDirectoryA
CreateProcessA
CloseHandle
ExitProcess
SetFileAttributesA
GetModuleFileNameA
LocalFree
InterlockedIncrement
RegQueryValueExA
RegDeleteKeyA
RegOpenKeyExA
RegQueryInfoKeyA
RegEnumKeyExA
RegCloseKey
BuildExplicitAccessWithNameA
SetEntriesInAclA
GetNamedSecurityInfoA
SetNamedSecurityInfoA
RegCreateKeyExA
RegSetValueExA
SHGetSpecialFolderPathA
CommandLineToArgvW
CoInitialize
CoGetInterfaceAndReleaseStream
CoMarshalInterThreadInterfaceInStream
CoUninitialize
CoCreateInstance
VariantClear
SysStringLen
LoadRegTypeLi
SysAllocString
SysFreeString
_access
_stricmp
_strupr
_adjust_fdiv
malloc
_initterm
free
_wcslwr
wcsstr
_purecall
memcpy
fopen
fseek
ftell
??2@YAPAXI@Z
fread
strcmp
strrchr
strstr
memset
sprintf
strlen
atoi
strchr
memcmp
??3@YAXPAX@Z
_strlwr
strcat
strncpy
strncmp
strcpy
fclose
SHSetValueA
SHDeleteValueA
SHDeleteKeyA
DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ