DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
ad2ca20be14fcec75e94b218dc4b2ab0_JaffaCakes118.dll
Resource
win7-20240708-en
Target
ad2ca20be14fcec75e94b218dc4b2ab0_JaffaCakes118
Size
68KB
MD5
ad2ca20be14fcec75e94b218dc4b2ab0
SHA1
1ce483e34ceba793f498460d44ff14627d37938d
SHA256
1874f527f20688439475add11dc9f864475410f938418a117eb4bc095aa7cc76
SHA512
4b9b22284223a3461bde3aaaf1d4d146718553a82cc2f389d4d10327454997dea032a35dc66fa619ca90701ae24ae7ae42bdbb431eb2954d02827334d91f4c07
SSDEEP
1536:1VdqDSJg2IZM9nApRXO/JwGQzLtutOTmSomM0gnm1pR:1eIg2b5Qz2OHMfnApR
Checks for missing Authenticode signature.
resource |
---|
ad2ca20be14fcec75e94b218dc4b2ab0_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetCommandLineW
FindNextFileA
DeleteFileA
GetPrivateProfileStringA
FindFirstFileA
GetCurrentProcessId
CloseHandle
Process32Next
Process32First
CreateProcessA
RemoveDirectoryA
GetSystemDirectoryA
ExitProcess
WritePrivateProfileStringA
InitializeCriticalSection
DeleteCriticalSection
InterlockedIncrement
InterlockedDecrement
HeapDestroy
GetShortPathNameA
GetModuleHandleA
MoveFileA
Sleep
GetExitCodeProcess
WaitForSingleObject
CreateThread
SetFileAttributesA
LocalFree
FreeLibrary
CreateDirectoryA
lstrlenA
MultiByteToWideChar
lstrlenW
WideCharToMultiByte
GetModuleFileNameA
LoadLibraryA
GetProcAddress
LeaveCriticalSection
EnterCriticalSection
DisableThreadLibraryCalls
RegSetValueExA
RegOpenKeyExA
RegQueryInfoKeyA
RegEnumKeyExA
RegDeleteKeyA
RegCloseKey
GetNamedSecurityInfoA
BuildExplicitAccessWithNameA
SetEntriesInAclA
SetNamedSecurityInfoA
RegQueryValueExA
RegCreateKeyExA
SHGetSpecialFolderPathA
CommandLineToArgvW
CoInitialize
CoGetInterfaceAndReleaseStream
CoMarshalInterThreadInterfaceInStream
CoUninitialize
CoCreateInstance
SysStringLen
LoadRegTypeLi
VariantClear
SysAllocString
SysFreeString
strcat
_strlwr
_stricmp
_adjust_fdiv
malloc
_initterm
free
strncmp
strncpy
fopen
fseek
ftell
fread
fclose
_purecall
strchr
??3@YAXPAX@Z
sprintf
memset
strlen
strstr
memcmp
memcpy
wcsstr
_wcslwr
_access
_strupr
strrchr
??2@YAPAXI@Z
strcmp
strcpy
atoi
SHDeleteValueA
SHDeleteKeyA
SHSetValueA
DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ