DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
aea4513e71aad526e44aa9a0f39eac3b_JaffaCakes118.dll
Resource
win7-20240708-en
Target
aea4513e71aad526e44aa9a0f39eac3b_JaffaCakes118
Size
76KB
MD5
aea4513e71aad526e44aa9a0f39eac3b
SHA1
5de2b9e5c19edbf04d57e0dd221336aacff9ae99
SHA256
4056384cd187f87ca442dfaf2201c1f9f1006668cfacd35c3d19dbe352c7f563
SHA512
a0eb95b8fdc55b3e426c63acd5d125c2867e32cde9fc02474116ce5c64f2da2b8ca531e48277b60cb831c8cc82b7e1b711bbe3ca48b76f6c8538a5eca50212df
SSDEEP
1536:QaTocwNs+5bsSjtK6en89fbUvFwsw7S1Qp4:7EsSxYofb4lw7Dp
Checks for missing Authenticode signature.
resource |
---|
aea4513e71aad526e44aa9a0f39eac3b_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
CreateProcessA
GetSystemDirectoryA
CreateDirectoryA
LocalFree
FreeLibrary
LoadLibraryA
RemoveDirectoryA
Process32Next
Process32First
CreateThread
GetProcAddress
DisableThreadLibraryCalls
InitializeCriticalSection
WaitForSingleObject
LeaveCriticalSection
InterlockedIncrement
EnterCriticalSection
InterlockedDecrement
HeapDestroy
GetShortPathNameA
GetModuleHandleA
ExitProcess
GetCommandLineW
WritePrivateProfileStringA
CloseHandle
GetExitCodeProcess
Sleep
FindFirstFileA
GetPrivateProfileStringA
FindNextFileA
GetCurrentProcessId
WideCharToMultiByte
lstrlenA
lstrlenW
GetModuleFileNameA
MultiByteToWideChar
SetFileAttributesA
MoveFileA
DeleteFileA
DeleteCriticalSection
RegDeleteKeyA
RegQueryInfoKeyA
RegEnumKeyExA
BuildExplicitAccessWithNameA
SetEntriesInAclA
GetNamedSecurityInfoA
SetNamedSecurityInfoA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
RegCreateKeyExA
RegSetValueExA
SHGetSpecialFolderPathA
CommandLineToArgvW
CoInitialize
CoGetInterfaceAndReleaseStream
CoMarshalInterThreadInterfaceInStream
CoUninitialize
CoCreateInstance
VariantClear
SysStringLen
LoadRegTypeLi
SysAllocString
SysFreeString
??2@YAPAXI@Z
_strlwr
_stricmp
_adjust_fdiv
malloc
_initterm
free
atoi
_purecall
strcmp
_wcslwr
wcsstr
_access
strcpy
strncmp
strchr
??3@YAXPAX@Z
strstr
sprintf
strlen
memset
memcmp
memcpy
strrchr
fclose
fread
_strupr
ftell
fseek
fopen
strcat
strncpy
SHSetValueA
SHDeleteKeyA
SHDeleteValueA
DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ