DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
be9754a4c40ed8e37dc28cbf948fd52c_JaffaCakes118.dll
Resource
win7-20240704-en
Target
be9754a4c40ed8e37dc28cbf948fd52c_JaffaCakes118
Size
64KB
MD5
be9754a4c40ed8e37dc28cbf948fd52c
SHA1
61fe7ecf4dcca1174a59ad1b408dd2843d9dc297
SHA256
c276143dd054a8775bbd0fb838b3edf6d0c0848269e03331e077fff0cf7fdb8a
SHA512
38f8ee8ea5a6986cf5d3bcb4a035ed6b808a98d380e008940bb4173fd9fd5612c49b8b14b0e1da854895d1e6f82a75b7b634f961896573ab4bc65737a79ef084
SSDEEP
1536:4Af8ZE4AzteXdsvFjMoL+/Rfj7m5hL4vwLY9:N4osdsdj1C/R7QhLGIY
Checks for missing Authenticode signature.
resource |
---|
be9754a4c40ed8e37dc28cbf948fd52c_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetProcAddress
GetCommandLineW
SetFileAttributesA
CreateThread
WritePrivateProfileStringA
Sleep
FindNextFileA
GetPrivateProfileStringA
FindFirstFileA
CreateProcessA
GetSystemDirectoryA
CreateDirectoryA
MoveFileA
DeleteFileA
DisableThreadLibraryCalls
InitializeCriticalSection
DeleteCriticalSection
LeaveCriticalSection
InterlockedIncrement
EnterCriticalSection
InterlockedDecrement
HeapDestroy
GetShortPathNameA
GetModuleHandleA
GetExitCodeProcess
WaitForSingleObject
LocalFree
ExitProcess
Process32First
Process32Next
CloseHandle
GetCurrentProcessId
LoadLibraryA
FreeLibrary
GetModuleFileNameA
WideCharToMultiByte
lstrlenA
MultiByteToWideChar
lstrlenW
RemoveDirectoryA
RegCreateKeyExA
RegSetValueExA
RegDeleteKeyA
BuildExplicitAccessWithNameA
SetEntriesInAclA
GetNamedSecurityInfoA
SetNamedSecurityInfoA
RegOpenKeyExA
RegQueryInfoKeyA
RegEnumKeyExA
RegCloseKey
RegQueryValueExA
CommandLineToArgvW
SHGetSpecialFolderPathA
CoMarshalInterThreadInterfaceInStream
CoGetInterfaceAndReleaseStream
CoInitialize
CoUninitialize
CoCreateInstance
SysStringLen
LoadRegTypeLi
VariantClear
SysAllocString
SysFreeString
fclose
_stricmp
_strlwr
_adjust_fdiv
malloc
_initterm
free
_purecall
strncmp
strncpy
_access
strlen
_wcslwr
wcsstr
strcat
fopen
memcmp
memcpy
??3@YAXPAX@Z
atoi
strchr
strstr
strcpy
sprintf
strcmp
strrchr
_strupr
fread
memset
??2@YAPAXI@Z
ftell
fseek
SHSetValueA
SHDeleteValueA
SHDeleteKeyA
DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ