DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
bb4e7614475381b24a905e7526a76cbb_JaffaCakes118.dll
Resource
win7-20240708-en
Target
bb4e7614475381b24a905e7526a76cbb_JaffaCakes118
Size
48KB
MD5
bb4e7614475381b24a905e7526a76cbb
SHA1
700fb8974a2cd958cc44059937d87e2d7d91d1a1
SHA256
d2c6d789cc033c4a1739e330f5a77dc561582a0be8cb036b5492e34a12cd2955
SHA512
cc942a9e1f37e35cf487b93a29f5a2ac009b53f7ae60197ea85c85cffcccb38685eda6a52b0d89474bcceb532dafd95f8854a01b6c5ce3cd733041ca2ec42163
SSDEEP
768:NUCOqGZhw6aDZJXGnzDWaJ1sa9h13Z3Vbin1Kw1zfYjYYb4M:NU4SGDCz1GajBqfdaYYbt
Checks for missing Authenticode signature.
resource |
---|
bb4e7614475381b24a905e7526a76cbb_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
CloseHandle
WaitForSingleObject
CreateProcessA
GetSystemDirectoryA
ExitProcess
MultiByteToWideChar
lstrlenA
Process32Next
Process32First
MoveFileA
GetProcAddress
LeaveCriticalSection
EnterCriticalSection
CreateDirectoryA
GetCurrentProcessId
GetExitCodeProcess
WideCharToMultiByte
lstrlenW
WritePrivateProfileStringA
DisableThreadLibraryCalls
InitializeCriticalSection
DeleteCriticalSection
InterlockedIncrement
InterlockedDecrement
HeapDestroy
GetShortPathNameA
GetModuleHandleA
GetCommandLineW
FindFirstFileA
GetPrivateProfileStringA
SetFileAttributesA
DeleteFileA
FindNextFileA
Sleep
GetModuleFileNameA
CreateThread
LocalFree
FreeLibrary
LoadLibraryA
RegOpenKeyExA
RegQueryValueExA
RegQueryInfoKeyA
GetNamedSecurityInfoA
BuildExplicitAccessWithNameA
SetEntriesInAclA
SetNamedSecurityInfoA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
RegEnumKeyExA
RegDeleteKeyA
CommandLineToArgvW
SHGetSpecialFolderPathA
CoUninitialize
CoInitialize
CoCreateInstance
CoGetInterfaceAndReleaseStream
CoMarshalInterThreadInterfaceInStream
SysStringLen
LoadRegTypeLi
SysAllocString
VariantClear
SysFreeString
strncpy
_strlwr
_strupr
_adjust_fdiv
malloc
_initterm
free
atoi
??2@YAPAXI@Z
_purecall
memcpy
memcmp
_access
_wcslwr
wcsstr
strcpy
??3@YAXPAX@Z
memset
strcmp
strrchr
strstr
sprintf
strcat
_stricmp
strchr
strncmp
strlen
SHDeleteKeyA
SHSetValueA
DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ