DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
ba14e3542a3f958c4c14e6a7dfcf6808_JaffaCakes118.dll
Resource
win7-20240729-en
Target
ba14e3542a3f958c4c14e6a7dfcf6808_JaffaCakes118
Size
64KB
MD5
ba14e3542a3f958c4c14e6a7dfcf6808
SHA1
c8af9b73e1669b00106856fdd29ccc5680584aea
SHA256
88a1e022e8d690ddb7d3b76d57a9b490a973a7d68c3d8e5ad65bb1be239fdb16
SHA512
1de388f6152e4a1c0bd50b934337457e6a5403920bfb4a839c7bd4b42915eb26f999629c517f7152626fc39b3f6b525fcb421b8904f46996b1687a300a9b205e
SSDEEP
1536:m/lbzd68Dg/6evLl6I/FmnCg0wiqRL3Ts/hkA:m9bzd6v1vp6I/FmnZ5R7Ts/h
Checks for missing Authenticode signature.
resource |
---|
ba14e3542a3f958c4c14e6a7dfcf6808_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetSystemDirectoryA
CreateThread
GetCurrentProcessId
GetExitCodeProcess
WaitForSingleObject
LocalFree
ExitProcess
FreeLibrary
RemoveDirectoryA
FindNextFileA
GetPrivateProfileStringA
FindFirstFileA
CreateDirectoryA
CreateProcessA
DisableThreadLibraryCalls
InitializeCriticalSection
DeleteCriticalSection
LeaveCriticalSection
InterlockedIncrement
EnterCriticalSection
InterlockedDecrement
HeapDestroy
GetShortPathNameA
GetModuleHandleA
Sleep
Process32First
Process32Next
CloseHandle
LoadLibraryA
GetProcAddress
SetFileAttributesA
MoveFileA
GetModuleFileNameA
WideCharToMultiByte
lstrlenA
MultiByteToWideChar
lstrlenW
DeleteFileA
WritePrivateProfileStringA
GetCommandLineW
RegDeleteKeyA
RegQueryValueExA
RegOpenKeyExA
RegQueryInfoKeyA
RegEnumKeyExA
RegCloseKey
BuildExplicitAccessWithNameA
SetEntriesInAclA
GetNamedSecurityInfoA
SetNamedSecurityInfoA
RegCreateKeyExA
RegSetValueExA
SHGetSpecialFolderPathA
CommandLineToArgvW
CoInitialize
CoUninitialize
CoGetInterfaceAndReleaseStream
CoMarshalInterThreadInterfaceInStream
CoCreateInstance
SysStringLen
LoadRegTypeLi
VariantClear
SysAllocString
SysFreeString
strcat
_stricmp
_strlwr
_adjust_fdiv
malloc
_initterm
free
_purecall
atoi
_wcslwr
wcsstr
strcmp
_access
strncmp
strchr
strncpy
sprintf
strstr
??3@YAXPAX@Z
fclose
fread
memset
??2@YAPAXI@Z
ftell
fseek
fopen
_strupr
strrchr
memcmp
memcpy
strlen
strcpy
SHSetValueA
SHDeleteKeyA
SHDeleteValueA
DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ