DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
b8341e0e310594028bff1f6185bd3088_JaffaCakes118.dll
Resource
win7-20240704-en
Target
b8341e0e310594028bff1f6185bd3088_JaffaCakes118
Size
76KB
MD5
b8341e0e310594028bff1f6185bd3088
SHA1
cd1dd955d834675b5f4405d4bc419047d32a1859
SHA256
50f2226b7870a0439f518dc8d57e37e25465f35fc336adc656dcfaaff1db492e
SHA512
95214390e6e770dc05bb866a616f9b33de9fd5bc625fc937b78405dd42d7e6eb8662940f07fe0968db7f0a814169f1aec1291de57b581381135e5b89206eec3f
SSDEEP
768:TyXf6yte2zz5M0jJbI/fDHZyOQq1BFzZf10JbiP5cfZ7uoqk4c0bHmM+sXrbKLCh:IznjJb6DEOQKLbqfMoqk4PmtsnK0vB
Checks for missing Authenticode signature.
resource |
---|
b8341e0e310594028bff1f6185bd3088_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetSystemDirectoryA
CreateThread
GetCurrentProcessId
Sleep
FindNextFileA
GetPrivateProfileStringA
FindFirstFileA
CreateDirectoryA
GetExitCodeProcess
WaitForSingleObject
LeaveCriticalSection
CloseHandle
WritePrivateProfileStringA
ExitProcess
DisableThreadLibraryCalls
InitializeCriticalSection
DeleteCriticalSection
InterlockedIncrement
InterlockedDecrement
HeapDestroy
GetShortPathNameA
GetModuleHandleA
Process32Next
Process32First
RemoveDirectoryA
CreateProcessA
LocalFree
GetCommandLineW
GetModuleFileNameA
lstrlenW
WideCharToMultiByte
lstrlenA
LoadLibraryA
GetProcAddress
FreeLibrary
MultiByteToWideChar
SetFileAttributesA
MoveFileA
DeleteFileA
EnterCriticalSection
RegCreateKeyExA
RegDeleteKeyA
RegSetValueExA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
BuildExplicitAccessWithNameA
SetEntriesInAclA
GetNamedSecurityInfoA
SetNamedSecurityInfoA
RegQueryInfoKeyA
RegEnumKeyExA
SHGetSpecialFolderPathA
CommandLineToArgvW
CoInitialize
CoUninitialize
CoGetInterfaceAndReleaseStream
CoMarshalInterThreadInterfaceInStream
CoCreateInstance
SysStringLen
LoadRegTypeLi
VariantClear
SysAllocString
SysFreeString
_access
_stricmp
_strlwr
_adjust_fdiv
malloc
_initterm
free
strncmp
strncpy
_wcslwr
wcsstr
strcmp
_purecall
memcpy
fopen
fseek
sprintf
strlen
atoi
strchr
??3@YAXPAX@Z
memcmp
strstr
strcat
strcpy
memset
_strupr
strrchr
fclose
fread
??2@YAPAXI@Z
ftell
SHSetValueA
SHDeleteKeyA
SHDeleteValueA
DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ