DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
bff4765990221015d0062b646aab8383_JaffaCakes118.dll
Resource
win7-20240704-en
Target
bff4765990221015d0062b646aab8383_JaffaCakes118
Size
72KB
MD5
bff4765990221015d0062b646aab8383
SHA1
6b0ab80a6a72f317fa00218438e785c3dcdadd14
SHA256
19b809e33f57d4989a7c5b6bcbe69b432151aab3c761f2a3fb4f2f95de29eeae
SHA512
447590da91d343524a3f2113e742880408585d672f678cd4ed83e979fdf719a3bb068296e1bf29e1af8da99ed4350e22c417f2bc9a7e97624548a4291d18b2c1
SSDEEP
1536:mgCIXPvgYLZ1sAm05f2YuYy196XkJTtx:RxBuYMHJTtx
Checks for missing Authenticode signature.
resource |
---|
bff4765990221015d0062b646aab8383_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
SetFileAttributesA
CreateThread
Sleep
GetExitCodeProcess
CloseHandle
WaitForSingleObject
GetSystemDirectoryA
GetCurrentProcessId
ExitProcess
FreeLibrary
DisableThreadLibraryCalls
LocalFree
DeleteCriticalSection
LeaveCriticalSection
InterlockedIncrement
EnterCriticalSection
InterlockedDecrement
HeapDestroy
GetShortPathNameA
GetModuleHandleA
MoveFileA
Process32Next
Process32First
CreateDirectoryA
GetModuleFileNameA
lstrlenW
WideCharToMultiByte
WritePrivateProfileStringA
GetCommandLineW
LoadLibraryA
GetProcAddress
FindFirstFileA
GetPrivateProfileStringA
FindNextFileA
lstrlenA
MultiByteToWideChar
DeleteFileA
CreateProcessA
RemoveDirectoryA
InitializeCriticalSection
RegOpenKeyExA
RegQueryValueExA
RegQueryInfoKeyA
RegEnumKeyExA
RegDeleteKeyA
RegCloseKey
BuildExplicitAccessWithNameA
SetEntriesInAclA
GetNamedSecurityInfoA
SetNamedSecurityInfoA
RegCreateKeyExA
RegSetValueExA
SHGetSpecialFolderPathA
CommandLineToArgvW
CoMarshalInterThreadInterfaceInStream
CoGetInterfaceAndReleaseStream
CoInitialize
CoUninitialize
CoCreateInstance
SysStringLen
LoadRegTypeLi
SysAllocString
VariantClear
SysFreeString
strlen
_stricmp
_strlwr
_adjust_fdiv
malloc
_initterm
free
_purecall
strcmp
strncmp
strncpy
fopen
fseek
ftell
??2@YAPAXI@Z
fread
??3@YAXPAX@Z
strcat
strcpy
memset
_access
sprintf
strstr
strrchr
wcsstr
_wcslwr
_strupr
memcmp
memcpy
atoi
strchr
fclose
SHSetValueA
SHDeleteKeyA
SHDeleteValueA
DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ