DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
c966122ad0ba2891b642b3882dacd9a1_JaffaCakes118.dll
Resource
win7-20240704-en
Target
c966122ad0ba2891b642b3882dacd9a1_JaffaCakes118
Size
72KB
MD5
c966122ad0ba2891b642b3882dacd9a1
SHA1
5370d96ca007e7f88f4679c90ef86f552464be27
SHA256
053f7733dbfd1d7665b8bebc09e16f01a953b38906ea5569e20197a453cf6d43
SHA512
bdafb4cc00241f1bd453b6b8542942de51c332f5dbbe8b7e309695531417f4d6ebc89a84eae9207c48827b94d3bb5c1982d7a3c6d2ff067715ef530f3de75c8c
SSDEEP
1536:1J+jNUXFKFrgm3Gt2QGNr96kyNPBjnGr8lpgi:r+S1KFrP2hFpnGwlpf
Checks for missing Authenticode signature.
resource |
---|
c966122ad0ba2891b642b3882dacd9a1_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetProcAddress
LoadLibraryA
WideCharToMultiByte
CreateThread
LocalFree
SetFileAttributesA
GetCommandLineW
FindNextFileA
DeleteFileA
FreeLibrary
FindFirstFileA
CreateDirectoryA
MoveFileA
CreateProcessA
RemoveDirectoryA
Sleep
GetSystemDirectoryA
WritePrivateProfileStringA
GetCurrentProcessId
ExitProcess
GetExitCodeProcess
WaitForSingleObject
Process32First
Process32Next
CloseHandle
GetModuleFileNameA
GetModuleHandleA
GetShortPathNameA
lstrlenA
MultiByteToWideChar
lstrlenW
HeapDestroy
InterlockedDecrement
EnterCriticalSection
InterlockedIncrement
LeaveCriticalSection
DeleteCriticalSection
DisableThreadLibraryCalls
InitializeCriticalSection
GetPrivateProfileStringA
RegCreateKeyExA
RegSetValueExA
RegEnumKeyExA
BuildExplicitAccessWithNameA
SetEntriesInAclA
GetNamedSecurityInfoA
SetNamedSecurityInfoA
RegQueryInfoKeyA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
RegDeleteKeyA
SHGetSpecialFolderPathA
CommandLineToArgvW
CoMarshalInterThreadInterfaceInStream
CoUninitialize
CoGetInterfaceAndReleaseStream
CoInitialize
CoCreateInstance
VariantClear
SysAllocString
SysStringLen
LoadRegTypeLi
SysFreeString
strstr
_strlwr
_stricmp
_adjust_fdiv
malloc
_initterm
free
atoi
strcmp
strncmp
strchr
strncpy
_wcslwr
wcsstr
fopen
fseek
memcpy
_purecall
??3@YAXPAX@Z
??2@YAPAXI@Z
memcmp
strcpy
sprintf
strlen
memset
strcat
_strupr
strrchr
_access
fclose
fread
ftell
SHDeleteValueA
SHDeleteKeyA
SHSetValueA
DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ