DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
03cdd4f45fa64323a71392c82e8e6611_JaffaCakes118.dll
Resource
win7-20240903-en
Target
03cdd4f45fa64323a71392c82e8e6611_JaffaCakes118
Size
60KB
MD5
03cdd4f45fa64323a71392c82e8e6611
SHA1
88f4721721a73d52ae62bc163c357f3083c70120
SHA256
ad6c2321f2b5cc814c6c877ea99a3acf40f6e05563646793cf9d516b0edad2fc
SHA512
976b8ed9ff60dd960d116db9e169a4a031091eb0562e097aaa63d3079fac1d122fa9d4d910d690a03314a517e51f39d5ebe5126b20eb695ed0248091a5893f8a
SSDEEP
1536:cC6q0O3b/TOvS3+hbdh6WSCspzOjTEdZXyTxFEo:cClOvs+hRh6WSVzOjwrXyTxFE
Checks for missing Authenticode signature.
resource |
---|
03cdd4f45fa64323a71392c82e8e6611_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
FindFirstFileA
CreateDirectoryA
CloseHandle
Process32Next
Process32First
Sleep
LocalFree
FreeLibrary
LoadLibraryA
GetCommandLineW
GetCurrentProcessId
CreateProcessA
RemoveDirectoryA
GetPrivateProfileStringA
WideCharToMultiByte
GetSystemDirectoryA
ExitProcess
MoveFileA
GetExitCodeProcess
WaitForSingleObject
CreateThread
WritePrivateProfileStringA
SetFileAttributesA
DeleteFileA
FindNextFileA
GetModuleFileNameA
GetModuleHandleA
GetShortPathNameA
lstrlenA
MultiByteToWideChar
lstrlenW
HeapDestroy
InterlockedDecrement
EnterCriticalSection
InterlockedIncrement
LeaveCriticalSection
DeleteCriticalSection
DisableThreadLibraryCalls
InitializeCriticalSection
GetProcAddress
RegCreateKeyExA
RegSetValueExA
BuildExplicitAccessWithNameA
SetEntriesInAclA
GetNamedSecurityInfoA
SetNamedSecurityInfoA
RegQueryValueExA
RegOpenKeyExA
RegQueryInfoKeyA
RegEnumKeyExA
RegDeleteKeyA
RegCloseKey
SHGetSpecialFolderPathA
CommandLineToArgvW
CoUninitialize
CoInitialize
CoMarshalInterThreadInterfaceInStream
CoGetInterfaceAndReleaseStream
CoCreateInstance
SysAllocString
VariantClear
SysStringLen
LoadRegTypeLi
SysFreeString
_access
_stricmp
_strlwr
_adjust_fdiv
malloc
_initterm
free
strncmp
strncpy
strchr
atoi
strlen
strcmp
fopen
fseek
ftell
strstr
memcpy
_purecall
??3@YAXPAX@Z
??2@YAPAXI@Z
memcmp
memset
strrchr
sprintf
strcat
_strupr
strcpy
wcsstr
_wcslwr
fclose
fread
SHSetValueA
SHDeleteValueA
SHDeleteKeyA
DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ