DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
d45e800f17bd4da17886b09909cdd438_JaffaCakes118.dll
Resource
win7-20240903-en
Target
d45e800f17bd4da17886b09909cdd438_JaffaCakes118
Size
80KB
MD5
d45e800f17bd4da17886b09909cdd438
SHA1
330cebbff2df23270dfc026190a7d253467feb16
SHA256
4157217bfe632250684e41a992e8f04064e9c6647a834ffbdb66ae18430af8d6
SHA512
5e61a1d63142911273ff7ae1f84b9742f3ba414f39bef7a4cbc6309ba616b4cf1439bacfa30a08cef1def13bb131968781c23a5c08f9cf1719a5d36c0cf0f5cc
SSDEEP
1536:7xr3Dmgyb5+1xRSyuoILmU/XdNRkBkwxccpeW:obqRSyuo9Bkw+cp
Checks for missing Authenticode signature.
resource |
---|
d45e800f17bd4da17886b09909cdd438_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetPrivateProfileStringA
FindFirstFileA
SetFileAttributesA
FreeLibrary
ExitProcess
WideCharToMultiByte
lstrlenW
CreateDirectoryA
MultiByteToWideChar
lstrlenA
CreateThread
FindNextFileA
DisableThreadLibraryCalls
InitializeCriticalSection
DeleteCriticalSection
LeaveCriticalSection
InterlockedIncrement
EnterCriticalSection
InterlockedDecrement
HeapDestroy
GetShortPathNameA
GetModuleHandleA
GetCurrentProcessId
MoveFileA
LoadLibraryA
GetProcAddress
DeleteFileA
RemoveDirectoryA
LocalFree
Process32First
Process32Next
Sleep
GetSystemDirectoryA
CreateProcessA
WaitForSingleObject
CloseHandle
GetExitCodeProcess
GetModuleFileNameA
WritePrivateProfileStringA
GetCommandLineW
SetEntriesInAclA
BuildExplicitAccessWithNameA
GetNamedSecurityInfoA
SetNamedSecurityInfoA
RegCreateKeyExA
RegSetValueExA
RegOpenKeyExA
RegQueryInfoKeyA
RegEnumKeyExA
RegCloseKey
RegDeleteKeyA
RegQueryValueExA
SHGetSpecialFolderPathA
CommandLineToArgvW
CoGetInterfaceAndReleaseStream
CoCreateInstance
CoMarshalInterThreadInterfaceInStream
CoInitialize
CoUninitialize
SysStringLen
LoadRegTypeLi
VariantClear
SysAllocString
SysFreeString
fread
_stricmp
_strupr
_adjust_fdiv
malloc
_initterm
free
atoi
_purecall
memcpy
memcmp
strlen
strncmp
strchr
strncpy
_wcslwr
strcmp
strrchr
sprintf
memset
??3@YAXPAX@Z
strcpy
strcat
_access
strstr
fclose
_strlwr
??2@YAPAXI@Z
ftell
fseek
fopen
wcsstr
SHSetValueA
SHDeleteValueA
SHDeleteKeyA
DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ