DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
bb5760162dfa057ada54465bd860349e_JaffaCakes118.dll
Resource
win7-20240704-en
Target
bb5760162dfa057ada54465bd860349e_JaffaCakes118
Size
52KB
MD5
bb5760162dfa057ada54465bd860349e
SHA1
09203931bcb7e8fcc49cc528c8a573eae72ef9de
SHA256
447ebb2c47235eadef5bf77f27abcb0e2c344ec4274c797880eeca0a2215a92f
SHA512
5ace324157690239fd892c0fd3e3de2e58b1419bf44e0e36e0f425b9dfdb801f77ec3d38287aea475b98f7d07e8098335805adacf27735068c20de5d275ab0c2
SSDEEP
1536:gnexLUP5437aAQjsikF+enYyGZWWl9tbN3:8U44377dikDuZntbN
Checks for missing Authenticode signature.
resource |
---|
bb5760162dfa057ada54465bd860349e_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
lstrlenW
WideCharToMultiByte
GetProcAddress
FindNextFileA
GetPrivateProfileStringA
FindFirstFileA
GetCurrentProcessId
RemoveDirectoryA
ExitProcess
Process32Next
Process32First
lstrlenA
DisableThreadLibraryCalls
InitializeCriticalSection
DeleteCriticalSection
InterlockedIncrement
InterlockedDecrement
HeapDestroy
GetShortPathNameA
GetModuleHandleA
GetExitCodeProcess
WaitForSingleObject
EnterCriticalSection
LeaveCriticalSection
MultiByteToWideChar
DeleteFileA
MoveFileA
Sleep
CreateThread
SetFileAttributesA
LocalFree
GetCommandLineW
WritePrivateProfileStringA
GetSystemDirectoryA
GetModuleFileNameA
CreateProcessA
CloseHandle
FreeLibrary
LoadLibraryA
CreateDirectoryA
RegCreateKeyExA
RegSetValueExA
BuildExplicitAccessWithNameA
SetEntriesInAclA
GetNamedSecurityInfoA
SetNamedSecurityInfoA
RegOpenKeyExA
RegQueryInfoKeyA
RegEnumKeyExA
RegDeleteKeyA
RegCloseKey
RegQueryValueExA
CommandLineToArgvW
SHGetSpecialFolderPathA
CoCreateInstance
CoUninitialize
CoGetInterfaceAndReleaseStream
CoInitialize
CoMarshalInterThreadInterfaceInStream
SysStringLen
LoadRegTypeLi
SysAllocString
VariantClear
SysFreeString
strncmp
_stricmp
_strupr
_adjust_fdiv
malloc
_initterm
free
_purecall
atoi
strcmp
_access
memcpy
memcmp
_wcslwr
wcsstr
strrchr
??3@YAXPAX@Z
sprintf
strstr
??2@YAPAXI@Z
memset
strlen
strcat
strcpy
strncpy
strchr
_strlwr
fclose
fread
ftell
fseek
fopen
SHDeleteValueA
SHDeleteKeyA
SHSetValueA
DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ