DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
bdf9095119c69ddd3b5468339a4820d0_JaffaCakes118.dll
Resource
win7-20240705-en
Target
bdf9095119c69ddd3b5468339a4820d0_JaffaCakes118
Size
64KB
MD5
bdf9095119c69ddd3b5468339a4820d0
SHA1
1295c847d01432ef054889e6f6ee3d50caba5af4
SHA256
13f48fd143799bba7b585041120ee0560823ec2aa8c216b074385f6f82fe059e
SHA512
15b40f64770300abdcff87319a87f8c3914ef45a4953de89ba348ebf08016e553e02fd24462868d6873b7753ea191337409809892697067d9697c9f34b5ae104
SSDEEP
1536:qg511E1SVb6BCi8/7Y6P2EbmijkY/xH/Ub/:q81OUO8i8/r+EbzBxH/Ub/
Checks for missing Authenticode signature.
resource |
---|
bdf9095119c69ddd3b5468339a4820d0_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
LeaveCriticalSection
EnterCriticalSection
FindNextFileA
DeleteFileA
SetFileAttributesA
GetPrivateProfileStringA
FindFirstFileA
MoveFileA
CreateDirectoryA
GetCurrentProcessId
ExitProcess
DisableThreadLibraryCalls
InitializeCriticalSection
InterlockedIncrement
InterlockedDecrement
HeapDestroy
GetShortPathNameA
GetModuleHandleA
FreeLibrary
CreateThread
WritePrivateProfileStringA
RemoveDirectoryA
Sleep
lstrlenA
MultiByteToWideChar
GetSystemDirectoryA
GetModuleFileNameA
CreateProcessA
WaitForSingleObject
GetExitCodeProcess
lstrlenW
WideCharToMultiByte
GetCommandLineW
Process32First
Process32Next
CloseHandle
LocalFree
GetProcAddress
LoadLibraryA
DeleteCriticalSection
RegQueryValueExA
RegCreateKeyExA
RegSetValueExA
GetNamedSecurityInfoA
BuildExplicitAccessWithNameA
SetEntriesInAclA
SetNamedSecurityInfoA
RegOpenKeyExA
RegQueryInfoKeyA
RegEnumKeyExA
RegDeleteKeyA
RegCloseKey
CommandLineToArgvW
SHGetSpecialFolderPathA
CoInitialize
CoUninitialize
CoGetInterfaceAndReleaseStream
CoMarshalInterThreadInterfaceInStream
CoCreateInstance
SysStringLen
LoadRegTypeLi
VariantClear
SysAllocString
SysFreeString
strlen
_stricmp
_strupr
_adjust_fdiv
malloc
_initterm
free
strncmp
strncpy
strcmp
fopen
fseek
ftell
fread
fclose
_purecall
??3@YAXPAX@Z
sprintf
atoi
strchr
strstr
wcsstr
_wcslwr
??2@YAPAXI@Z
memset
strcpy
_strlwr
memcmp
memcpy
strrchr
strcat
_access
SHDeleteValueA
SHSetValueA
SHDeleteKeyA
DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ