DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
0354e993c057eb6e2709d468b6db142f_JaffaCakes118.dll
Resource
win7-20240903-en
Target
0354e993c057eb6e2709d468b6db142f_JaffaCakes118
Size
56KB
MD5
0354e993c057eb6e2709d468b6db142f
SHA1
587de0e094e50ef4229a40eb01931f5a75771fdd
SHA256
b7c0d3c2b8112ff1ae0d16d457fbbb8312eed3f25d07966289de8236357b0512
SHA512
9495af27d2895aa3f5c8629c5b9eb2a59657dcc6e1b112c661bad05a86f843d3ce1168614d0bc1e5d5adde350af20c1a09bca994ab1e2ab9f3e2963d0c4ce3cd
SSDEEP
768:q1K1rS3ihTZij96ZnQouxK7a0UtnoIKsO5jEnmsQAH6x3mX/XieRjHLK:qgr8sMZfoza04o5/mmsQAakfiQrK
Checks for missing Authenticode signature.
resource |
---|
0354e993c057eb6e2709d468b6db142f_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
HeapDestroy
lstrlenW
MultiByteToWideChar
lstrlenA
GetShortPathNameA
GetModuleHandleA
FindNextFileA
DeleteFileA
SetFileAttributesA
GetPrivateProfileStringA
FindFirstFileA
Process32Next
Process32First
InterlockedDecrement
CreateDirectoryA
GetCommandLineW
LocalFree
CreateThread
ExitProcess
WritePrivateProfileStringA
WideCharToMultiByte
InterlockedIncrement
DeleteCriticalSection
InitializeCriticalSection
DisableThreadLibraryCalls
FreeLibrary
EnterCriticalSection
LeaveCriticalSection
LoadLibraryA
GetProcAddress
Sleep
GetCurrentProcessId
GetSystemDirectoryA
GetModuleFileNameA
CreateProcessA
WaitForSingleObject
CloseHandle
GetExitCodeProcess
MoveFileA
GetNamedSecurityInfoA
BuildExplicitAccessWithNameA
SetEntriesInAclA
SetNamedSecurityInfoA
RegQueryInfoKeyA
RegEnumKeyExA
RegDeleteKeyA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
RegCreateKeyExA
RegSetValueExA
SHGetSpecialFolderPathA
CommandLineToArgvW
CoInitialize
CoUninitialize
CoGetInterfaceAndReleaseStream
CoMarshalInterThreadInterfaceInStream
CoCreateInstance
SysAllocString
VariantClear
SysStringLen
LoadRegTypeLi
SysFreeString
memcpy
_strupr
_stricmp
_adjust_fdiv
malloc
_initterm
free
_wcslwr
wcsstr
atoi
fopen
fseek
ftell
fread
fclose
_access
??3@YAXPAX@Z
memset
sprintf
strcmp
strrchr
strncpy
strchr
strncmp
strlen
strcpy
_strlwr
_purecall
??2@YAPAXI@Z
memcmp
strstr
strcat
SHSetValueA
SHDeleteKeyA
SHDeleteValueA
DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ