DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
0c339092b2f025e51c11f4d0805f21a3_JaffaCakes118.dll
Resource
win7-20240903-en
Target
0c339092b2f025e51c11f4d0805f21a3_JaffaCakes118
Size
60KB
MD5
0c339092b2f025e51c11f4d0805f21a3
SHA1
420ddee44845726037de5cd7ffb814a605b1756c
SHA256
b0b72df50b9039e325a4d46f430146714471b4958e244597af39e9103de2ae18
SHA512
4cc0b858289277b3f3565bcc0c7c521e8e6e23695bd64c5e9905e9b3edad8da67c825903723bee21246d9c8e21529e9fb481a49adcb70163d849143f49bc1e96
SSDEEP
768:i/4cJzB+qKbE+s9OzjB82ylO57tqRiNC+X5CxzZitztdL/QsJwD505UH:i/4K8qKbTzjBVnx7XaMr8sJYsUH
Checks for missing Authenticode signature.
resource |
---|
0c339092b2f025e51c11f4d0805f21a3_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
lstrlenA
WritePrivateProfileStringA
WideCharToMultiByte
lstrlenW
ExitProcess
Sleep
GetExitCodeProcess
WaitForSingleObject
GetCommandLineW
RemoveDirectoryA
CreateThread
MultiByteToWideChar
EnterCriticalSection
MoveFileA
DisableThreadLibraryCalls
InitializeCriticalSection
DeleteCriticalSection
InterlockedIncrement
InterlockedDecrement
HeapDestroy
GetShortPathNameA
GetModuleHandleA
LocalFree
GetCurrentProcessId
GetSystemDirectoryA
CreateProcessA
FreeLibrary
FindFirstFileA
GetPrivateProfileStringA
SetFileAttributesA
DeleteFileA
FindNextFileA
Process32First
Process32Next
CloseHandle
LoadLibraryA
GetProcAddress
GetModuleFileNameA
CreateDirectoryA
LeaveCriticalSection
RegQueryValueExA
RegEnumKeyExA
RegDeleteKeyA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
GetNamedSecurityInfoA
BuildExplicitAccessWithNameA
SetEntriesInAclA
SetNamedSecurityInfoA
RegOpenKeyExA
RegQueryInfoKeyA
SHGetSpecialFolderPathA
CommandLineToArgvW
CoUninitialize
CoInitialize
CoMarshalInterThreadInterfaceInStream
CoGetInterfaceAndReleaseStream
CoCreateInstance
SysStringLen
LoadRegTypeLi
SysAllocString
VariantClear
SysFreeString
wcsstr
_stricmp
_strupr
_adjust_fdiv
malloc
_initterm
free
_purecall
atoi
strncmp
strchr
strncpy
fopen
fseek
ftell
fread
??3@YAXPAX@Z
strcmp
strrchr
_access
strcat
strlen
memset
strcpy
sprintf
strstr
_strlwr
_wcslwr
memcmp
memcpy
??2@YAPAXI@Z
fclose
SHDeleteValueA
SHDeleteKeyA
SHSetValueA
DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ