DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
a581bda8bea0f8eabe40fdd6092d0378_JaffaCakes118.dll
Resource
win7-20240729-en
Target
a581bda8bea0f8eabe40fdd6092d0378_JaffaCakes118
Size
80KB
MD5
a581bda8bea0f8eabe40fdd6092d0378
SHA1
e9a046d37e8665250049ee2ae4024b16e8c2df02
SHA256
6a71d27c31b60e47b2498c563ae148d9137653196b606daff2371a6880479526
SHA512
cb3286a93e7ae05adc0c697fe6ae9101eda01ff0e240f7262b21a58fbbb346a1ad566de080f5188eb0755a96697984926c5496951fa2db0696d177c36d41cdd7
SSDEEP
1536:VByMH9iHIxYiGO9Q82OY7TonBpCHig3tGcVQC:V55Q82OyiiQcVQC
Checks for missing Authenticode signature.
resource |
---|
a581bda8bea0f8eabe40fdd6092d0378_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
lstrlenA
GetModuleFileNameA
GetExitCodeProcess
CloseHandle
WaitForSingleObject
CreateProcessA
GetSystemDirectoryA
DisableThreadLibraryCalls
InitializeCriticalSection
DeleteCriticalSection
InterlockedIncrement
InterlockedDecrement
GetShortPathNameA
GetModuleHandleA
GetCurrentProcessId
Process32Next
Process32First
CreateThread
GetCommandLineW
RemoveDirectoryA
WritePrivateProfileStringA
ExitProcess
GetProcAddress
LoadLibraryA
FreeLibrary
CreateDirectoryA
Sleep
FindFirstFileA
GetPrivateProfileStringA
FindNextFileA
lstrlenW
WideCharToMultiByte
LocalFree
EnterCriticalSection
LeaveCriticalSection
MultiByteToWideChar
SetFileAttributesA
MoveFileA
DeleteFileA
HeapDestroy
RegDeleteKeyA
RegCreateKeyExA
RegSetValueExA
RegQueryInfoKeyA
RegEnumKeyExA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
BuildExplicitAccessWithNameA
SetEntriesInAclA
GetNamedSecurityInfoA
SetNamedSecurityInfoA
SHGetSpecialFolderPathA
CommandLineToArgvW
CoInitialize
CoUninitialize
CoGetInterfaceAndReleaseStream
CoMarshalInterThreadInterfaceInStream
CoCreateInstance
VariantClear
SysStringLen
LoadRegTypeLi
SysAllocString
SysFreeString
ftell
_strlwr
_stricmp
_adjust_fdiv
malloc
_initterm
free
_wcslwr
wcsstr
strcmp
_purecall
memcpy
memcmp
_access
strcpy
strncmp
??3@YAXPAX@Z
sprintf
strlen
strstr
atoi
strchr
fclose
fread
memset
??2@YAPAXI@Z
_strupr
fseek
fopen
strcat
strrchr
strncpy
SHSetValueA
SHDeleteKeyA
SHDeleteValueA
DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ