DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
bc857a7aeb6e67866f9497cfa3670726_JaffaCakes118.dll
Resource
win7-20240704-en
Target
bc857a7aeb6e67866f9497cfa3670726_JaffaCakes118
Size
52KB
MD5
bc857a7aeb6e67866f9497cfa3670726
SHA1
e64a3822c3f8434f00bf4b6cf0e7bd7cd35409b8
SHA256
d0d585ffea16710cbbce001d11885fe4342bda7beff7a62432ff5b6da9bfd814
SHA512
531cc168fb46e684da1ad2b804ed3cce6fd64db54c9fea283d6b7981160402c03e518abc149b1b809caaad1cf739dd22728c641b83e983711e810bf6dca553a4
SSDEEP
1536:gxNXsJxHzQFDigvW2VxJbxeV+r3eHEdNHY5Q:gQHGDiExtxrY
Checks for missing Authenticode signature.
resource |
---|
bc857a7aeb6e67866f9497cfa3670726_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetModuleFileNameA
GetProcAddress
LoadLibraryA
CloseHandle
FreeLibrary
WideCharToMultiByte
ExitProcess
Process32Next
Process32First
GetCommandLineW
CreateProcessA
GetModuleHandleA
GetSystemDirectoryA
GetExitCodeProcess
WaitForSingleObject
GetCurrentProcessId
FindNextFileA
GetPrivateProfileStringA
FindFirstFileA
CreateDirectoryA
CreateThread
WritePrivateProfileStringA
GetShortPathNameA
lstrlenA
lstrlenW
HeapDestroy
InterlockedDecrement
InterlockedIncrement
DeleteCriticalSection
InitializeCriticalSection
DisableThreadLibraryCalls
MultiByteToWideChar
MoveFileA
Sleep
EnterCriticalSection
LeaveCriticalSection
SetFileAttributesA
LocalFree
DeleteFileA
RemoveDirectoryA
RegCreateKeyExA
RegSetValueExA
RegQueryInfoKeyA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
GetNamedSecurityInfoA
BuildExplicitAccessWithNameA
SetEntriesInAclA
SetNamedSecurityInfoA
RegDeleteKeyA
RegEnumKeyExA
SHGetSpecialFolderPathA
CommandLineToArgvW
CoGetInterfaceAndReleaseStream
CoCreateInstance
CoMarshalInterThreadInterfaceInStream
CoInitialize
CoUninitialize
VariantClear
SysAllocString
SysStringLen
LoadRegTypeLi
SysFreeString
strrchr
_strlwr
_stricmp
_adjust_fdiv
malloc
_initterm
free
strcmp
strncmp
strncpy
_access
strchr
atoi
_wcslwr
wcsstr
strcpy
memset
sprintf
??3@YAXPAX@Z
fclose
fread
??2@YAPAXI@Z
ftell
fseek
fopen
strcat
_strupr
strstr
strlen
memcpy
_purecall
memcmp
SHSetValueA
SHDeleteKeyA
SHDeleteValueA
DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ