DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
f68f60596e844ac87817229c92609f80_JaffaCakes118.dll
Resource
win7-20240903-en
Target
f68f60596e844ac87817229c92609f80_JaffaCakes118
Size
64KB
MD5
f68f60596e844ac87817229c92609f80
SHA1
b3cc3b5fd0483f2d28b491f5f58b0a4e99934a64
SHA256
559cf7534c6f7365c7646970ac34edafafd8aee2ee514507cf30fd8dae6f4039
SHA512
dd5b38561119f3e9ef0c5f65ef5a37eda0c77dee8e54e3a58bee6cba2f7611dc6d2d8eccd15c14f7153dc55810399640d36dca7edb9434e2e3fe3e10d43c3374
SSDEEP
1536:IIZN3/ddSjPBIMozMWNFRcxsvHGLXGlP000:Yjs9hRGLWlPG
Checks for missing Authenticode signature.
resource |
---|
f68f60596e844ac87817229c92609f80_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
WideCharToMultiByte
lstrlenW
FindNextFileA
DeleteFileA
GetPrivateProfileStringA
FindFirstFileA
CreateThread
ExitProcess
GetCurrentProcessId
WritePrivateProfileStringA
lstrlenA
GetCommandLineW
RemoveDirectoryA
MoveFileA
CreateDirectoryA
DisableThreadLibraryCalls
InitializeCriticalSection
DeleteCriticalSection
InterlockedIncrement
InterlockedDecrement
HeapDestroy
GetShortPathNameA
GetModuleHandleA
MultiByteToWideChar
LocalFree
Process32First
Process32Next
GetSystemDirectoryA
GetModuleFileNameA
CreateProcessA
WaitForSingleObject
CloseHandle
GetExitCodeProcess
FreeLibrary
LoadLibraryA
GetProcAddress
Sleep
LeaveCriticalSection
EnterCriticalSection
SetFileAttributesA
RegSetValueExA
GetNamedSecurityInfoA
BuildExplicitAccessWithNameA
SetEntriesInAclA
SetNamedSecurityInfoA
RegOpenKeyExA
RegQueryInfoKeyA
RegEnumKeyExA
RegDeleteKeyA
RegCloseKey
RegQueryValueExA
RegCreateKeyExA
SHGetSpecialFolderPathA
CommandLineToArgvW
CoGetInterfaceAndReleaseStream
CoCreateInstance
CoMarshalInterThreadInterfaceInStream
CoInitialize
CoUninitialize
SysStringLen
LoadRegTypeLi
VariantClear
SysAllocString
SysFreeString
fread
_stricmp
_strupr
_adjust_fdiv
malloc
_initterm
free
_purecall
atoi
_wcslwr
wcsstr
_access
memcpy
strncmp
strchr
strncpy
??3@YAXPAX@Z
sprintf
strstr
??2@YAPAXI@Z
memset
strcpy
strcmp
strrchr
memcmp
fclose
_strlwr
ftell
fseek
fopen
strcat
strlen
SHSetValueA
SHDeleteValueA
SHDeleteKeyA
DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ