DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
bd065740d5d6abcf7eef03ebdab5315f_JaffaCakes118.dll
Resource
win7-20240729-en
Target
bd065740d5d6abcf7eef03ebdab5315f_JaffaCakes118
Size
60KB
MD5
bd065740d5d6abcf7eef03ebdab5315f
SHA1
fedd6af4cea771b5e4fd9b4f6a29083c5bb43171
SHA256
151fa8731654304974bf41db85174ef7de4a03fbf6ab187160df7ed9e0cb6e8b
SHA512
cfc55b3075e6aac7c55e4bf8c12c3c9d9fbd7ba68e031ad5ccd4d1766976c20b0c7daf00c21f70effc76d32b11204888e9ec589570212e27f8d3be39b1743215
SSDEEP
1536:GBigrImybar4LjLhDxCCCQUqNYcLwRQQ:qigpuNCCjicLMQQ
Checks for missing Authenticode signature.
resource |
---|
bd065740d5d6abcf7eef03ebdab5315f_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
CloseHandle
LocalFree
CreateThread
FreeLibrary
LoadLibraryA
Process32Next
Process32First
GetProcAddress
CreateProcessA
GetSystemDirectoryA
SetFileAttributesA
WideCharToMultiByte
FindNextFileA
GetPrivateProfileStringA
FindFirstFileA
RemoveDirectoryA
Sleep
GetExitCodeProcess
WaitForSingleObject
WritePrivateProfileStringA
GetCommandLineW
CreateDirectoryA
GetCurrentProcessId
MoveFileA
GetModuleFileNameA
GetModuleHandleA
GetShortPathNameA
lstrlenA
MultiByteToWideChar
lstrlenW
HeapDestroy
InterlockedDecrement
EnterCriticalSection
InterlockedIncrement
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
DisableThreadLibraryCalls
ExitProcess
DeleteFileA
GetNamedSecurityInfoA
BuildExplicitAccessWithNameA
SetEntriesInAclA
SetNamedSecurityInfoA
RegQueryValueExA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
RegOpenKeyExA
RegQueryInfoKeyA
RegEnumKeyExA
RegDeleteKeyA
SHGetSpecialFolderPathA
CommandLineToArgvW
CoInitialize
CoUninitialize
CoGetInterfaceAndReleaseStream
CoMarshalInterThreadInterfaceInStream
CoCreateInstance
VariantClear
SysAllocString
SysStringLen
LoadRegTypeLi
SysFreeString
strcat
_stricmp
_strlwr
_adjust_fdiv
malloc
_initterm
free
strncmp
strncpy
strcmp
strchr
atoi
_access
_wcslwr
wcsstr
strcpy
sprintf
strstr
??3@YAXPAX@Z
fclose
fread
memset
??2@YAPAXI@Z
ftell
fseek
fopen
_strupr
strrchr
memcpy
_purecall
memcmp
strlen
SHSetValueA
SHDeleteKeyA
SHDeleteValueA
DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ