DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
0704bb673d2245749847fa03a95cee46_JaffaCakes118.dll
Resource
win7-20240903-en
Target
0704bb673d2245749847fa03a95cee46_JaffaCakes118
Size
68KB
MD5
0704bb673d2245749847fa03a95cee46
SHA1
aa0f6f49987ba34027fd350cfa7feac3b127a974
SHA256
59917fbdf35b347083690c2574f3dda376f34a534bac892fc222db747cc12d41
SHA512
7f24118a6cb6037d24e220c33f7da779641ca706a9cbdb7bd71b16221b7886635b3c3b06cf6ddef0a86f67965fb3dfe2fa2668d57211ddac888149005bde46b3
SSDEEP
1536:5w0EvLfEX/ujewn6+so2JXbreqdEZougiH5+DoIkMsj:5BNw6WIrrDdEZojm+cIkMs
Checks for missing Authenticode signature.
resource |
---|
0704bb673d2245749847fa03a95cee46_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
WideCharToMultiByte
lstrlenW
MoveFileA
CreateDirectoryA
ExitProcess
CreateProcessA
GetSystemDirectoryA
RemoveDirectoryA
Process32Next
Process32First
WritePrivateProfileStringA
Sleep
GetCurrentProcessId
GetExitCodeProcess
WaitForSingleObject
DisableThreadLibraryCalls
InitializeCriticalSection
DeleteCriticalSection
InterlockedIncrement
InterlockedDecrement
HeapDestroy
GetShortPathNameA
GetModuleHandleA
lstrlenA
MultiByteToWideChar
EnterCriticalSection
LeaveCriticalSection
GetModuleFileNameA
CloseHandle
FindFirstFileA
GetPrivateProfileStringA
SetFileAttributesA
FindNextFileA
GetProcAddress
GetCommandLineW
LoadLibraryA
FreeLibrary
LocalFree
DeleteFileA
CreateThread
RegQueryValueExA
RegDeleteKeyA
RegOpenKeyExA
RegQueryInfoKeyA
RegEnumKeyExA
RegCloseKey
GetNamedSecurityInfoA
BuildExplicitAccessWithNameA
SetEntriesInAclA
SetNamedSecurityInfoA
RegCreateKeyExA
RegSetValueExA
CommandLineToArgvW
SHGetSpecialFolderPathA
CoInitialize
CoUninitialize
CoGetInterfaceAndReleaseStream
CoMarshalInterThreadInterfaceInStream
CoCreateInstance
SysStringLen
LoadRegTypeLi
VariantClear
SysAllocString
SysFreeString
sprintf
_strupr
_stricmp
_adjust_fdiv
malloc
_initterm
free
_purecall
strncmp
strncpy
memcpy
strchr
atoi
_wcslwr
wcsstr
_access
memset
??3@YAXPAX@Z
fclose
fread
??2@YAPAXI@Z
ftell
fseek
fopen
strcat
strrchr
_strlwr
strstr
strlen
strcpy
strcmp
memcmp
SHSetValueA
SHDeleteKeyA
SHDeleteValueA
DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ