DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
spm1316.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
spm1316.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
spmsg.dll
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
spmsg.dll
Resource
win10v2004-20240802-en
Target
a4ac34e45417f2e6728a67f45adba8a5_JaffaCakes118
Size
51KB
MD5
a4ac34e45417f2e6728a67f45adba8a5
SHA1
3684363b31bb32ef5396f267f4ad3cbd23a581fa
SHA256
166bf08f97bea3b4eb507d9816525d555bac3a7fb416f35c73b2ab4dc9f79b2f
SHA512
8246791554e3348d605bd93cf2f2263ecf74903a6fd4e777fb50d89d753b85f9719504842a6bdec8381192830a9af9470bab1880272ca5045dc86123c5ae4381
SSDEEP
768:uhonrMB0PXYfgPc0LcPAekYpNB/rwhNvvuirbc0VeXweWiqIgADHZ:LXPIfgE9YY3drwhNHfbHVgwkqwZ
Checks for missing Authenticode signature.
resource |
---|
unpack004/spm1316.dll |
unpack004/spmsg.dll |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PathFileExistsA
PathAddBackslashA
SHSetValueA
PathFindExtensionA
UuidCreate
GetLastError
MultiByteToWideChar
WideCharToMultiByte
RaiseException
InitializeCriticalSection
DeleteCriticalSection
lstrcatA
lstrlenA
GetModuleFileNameA
lstrlenW
EnterCriticalSection
LeaveCriticalSection
CloseHandle
InterlockedIncrement
InterlockedDecrement
lstrcmpiA
CreateFileA
SetFilePointer
SetEndOfFile
GetTempFileNameA
GetTempPathA
DeleteFileA
MapViewOfFileEx
CreateFileMappingA
GetFileSize
OpenFileMappingA
UnmapViewOfFile
GetTickCount
HeapFree
DisableThreadLibraryCalls
ReleaseMutex
WaitForSingleObject
CreateMutexA
IsDBCSLeadByte
lstrcpynA
FreeLibrary
SizeofResource
LoadResource
FindResourceA
LoadLibraryExA
GetModuleHandleA
GetProcAddress
LoadLibraryA
FindClose
FindNextFileA
FindFirstFileA
Sleep
GetProcessHeap
UnlockFile
WriteFile
LockFile
CreateProcessA
GetLocaleInfoA
lstrcmpA
ReadFile
GetPrivateProfileStringA
WritePrivateProfileStringA
GetSystemTimeAsFileTime
InterlockedExchange
HeapReAlloc
RtlUnwind
VirtualQuery
HeapAlloc
lstrcpyA
GetVersionExA
PeekMessageA
TranslateMessage
DispatchMessageA
CharNextA
wsprintfA
GetUserNameA
RegEnumKeyExA
RegQueryInfoKeyA
RegSetValueExA
RegOpenKeyExA
RegCreateKeyExA
RegDeleteValueA
RegCloseKey
RegDeleteKeyA
SHGetSpecialFolderPathA
CoCreateInstance
StringFromGUID2
CoTaskMemRealloc
CoTaskMemFree
CoTaskMemAlloc
VarUI4FromStr
RegisterTypeLi
UnRegisterTypeLi
LoadTypeLi
SysStringLen
VariantInit
VariantClear
VariantChangeType
VariantCopy
SafeArrayUnaccessData
SafeArrayAccessData
SafeArrayCreateVector
LoadRegTypeLi
SysAllocString
SysFreeString
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ