DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
d4056489ad26300cd1c5ef5729e07438_JaffaCakes118.dll
Resource
win7-20240903-en
Target
d4056489ad26300cd1c5ef5729e07438_JaffaCakes118
Size
72KB
MD5
d4056489ad26300cd1c5ef5729e07438
SHA1
67b729c4ed0ed4306b0361045c6d8ffdd686306c
SHA256
5eefc87501323e7227a9262c61e2b3a4f68d0d6d6f9d20e981ed64aba64d2481
SHA512
c537a38ce7384066d77468c8e1141eaa7d584ea61274d2a2ca49680b20ae59a2bdf67186230a137cd093335f6d2d669b0c22b54bef5c4ba3f8dfeffe1f498f04
SSDEEP
1536:02colAIKRMYRQSQgEAn5xHXcPmFApzS+cj:HCIuMO577Me+K
Checks for missing Authenticode signature.
resource |
---|
d4056489ad26300cd1c5ef5729e07438_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
HeapDestroy
lstrlenW
MultiByteToWideChar
lstrlenA
GetShortPathNameA
GetModuleHandleA
GetModuleFileNameA
WritePrivateProfileStringA
FindNextFileA
GetPrivateProfileStringA
FindFirstFileA
CloseHandle
Process32Next
InterlockedDecrement
GetExitCodeProcess
WaitForSingleObject
GetSystemDirectoryA
CreateThread
GetCommandLineW
GetCurrentProcessId
WideCharToMultiByte
SetFileAttributesA
MoveFileA
CreateDirectoryA
EnterCriticalSection
InterlockedIncrement
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
DisableThreadLibraryCalls
DeleteFileA
RemoveDirectoryA
CreateProcessA
Sleep
ExitProcess
LocalFree
FreeLibrary
GetProcAddress
LoadLibraryA
Process32First
RegDeleteKeyA
RegSetValueExA
GetNamedSecurityInfoA
BuildExplicitAccessWithNameA
SetEntriesInAclA
SetNamedSecurityInfoA
RegEnumKeyExA
RegCloseKey
RegOpenKeyExA
RegQueryInfoKeyA
RegQueryValueExA
RegCreateKeyExA
SHGetSpecialFolderPathA
CommandLineToArgvW
CoGetInterfaceAndReleaseStream
CoCreateInstance
CoMarshalInterThreadInterfaceInStream
CoInitialize
CoUninitialize
SysAllocString
VariantClear
SysStringLen
LoadRegTypeLi
SysFreeString
strstr
_strlwr
_stricmp
_adjust_fdiv
malloc
_initterm
free
_wcslwr
wcsstr
atoi
strncmp
strchr
strncpy
fopen
fseek
ftell
sprintf
??3@YAXPAX@Z
strcat
strcpy
memset
_access
memcpy
_purecall
??2@YAPAXI@Z
memcmp
_strupr
strrchr
strcmp
strlen
fclose
fread
SHDeleteValueA
SHDeleteKeyA
SHSetValueA
DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ