DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
b059be61e8ca382de24405bca392e877_JaffaCakes118.dll
Resource
win7-20240729-en
Target
b059be61e8ca382de24405bca392e877_JaffaCakes118
Size
48KB
MD5
b059be61e8ca382de24405bca392e877
SHA1
247a4f875fc5379107e25b18a88223629ed8eefe
SHA256
667147f401cc4d996455a0709adfbd55495d29bd7bc0211a346a881528acd202
SHA512
281987a6571f1513a39b8abef28b701341393591e024984f547d2886640ec8de420bbe3bef938a5bde20b8e58619484ba1ecacc07694ea16f280c78fac60f0c9
SSDEEP
768:ahZm4FJJQjrqminpHWLmgabZGiilxjBV1ZUjMy0FQJR3yJtTDCip/ZVILM4e:YJPZvOv1ZZyK97/H/ZVILM4
Checks for missing Authenticode signature.
resource |
---|
b059be61e8ca382de24405bca392e877_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetCommandLineW
GetExitCodeProcess
CloseHandle
WaitForSingleObject
CreateProcessA
GetSystemDirectoryA
Process32Next
Process32First
DisableThreadLibraryCalls
InitializeCriticalSection
DeleteCriticalSection
LeaveCriticalSection
InterlockedIncrement
WritePrivateProfileStringA
InterlockedDecrement
HeapDestroy
GetShortPathNameA
GetModuleHandleA
RemoveDirectoryA
GetCurrentProcessId
CreateDirectoryA
CreateThread
MoveFileA
ExitProcess
SetFileAttributesA
LocalFree
Sleep
FindFirstFileA
GetPrivateProfileStringA
DeleteFileA
FindNextFileA
GetModuleFileNameA
lstrlenW
WideCharToMultiByte
lstrlenA
MultiByteToWideChar
LoadLibraryA
FreeLibrary
GetProcAddress
EnterCriticalSection
RegQueryValueExA
BuildExplicitAccessWithNameA
SetEntriesInAclA
GetNamedSecurityInfoA
SetNamedSecurityInfoA
RegCreateKeyExA
RegSetValueExA
RegOpenKeyExA
RegQueryInfoKeyA
RegEnumKeyExA
RegDeleteKeyA
RegCloseKey
CommandLineToArgvW
SHGetSpecialFolderPathA
CoUninitialize
CoInitialize
CoMarshalInterThreadInterfaceInStream
CoGetInterfaceAndReleaseStream
CoCreateInstance
SysStringLen
LoadRegTypeLi
VariantClear
SysAllocString
SysFreeString
strlen
_strlwr
_strupr
_adjust_fdiv
malloc
_initterm
free
strcmp
_access
_purecall
memcpy
atoi
_wcslwr
wcsstr
strcat
fopen
memcmp
??3@YAXPAX@Z
sprintf
strstr
??2@YAPAXI@Z
strrchr
strncpy
strchr
memset
strncmp
_stricmp
strcpy
fclose
fread
ftell
fseek
SHSetValueA
SHDeleteKeyA
SHDeleteValueA
DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ