DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
0eb7d6d8994cdc76f5f1da868c06a956_JaffaCakes118.dll
Resource
win7-20240708-en
Target
0eb7d6d8994cdc76f5f1da868c06a956_JaffaCakes118
Size
68KB
MD5
0eb7d6d8994cdc76f5f1da868c06a956
SHA1
121986155e18ce6eb00e7644d74fe6ba9e2b413b
SHA256
9fd5dfc11b2d581327c96aa6b62b185944c3d7b97e5c1099ce7aeeb1bdc9f09e
SHA512
673d16a3b700c62e53e252fd6d863a2b742923816f221133bb589191f8965599fe0136ee2bfaf6ce1f567d07f7834ec8b727b78ec5f38a8c701d1ce73b380403
SSDEEP
1536:XaPaZdUVSk7+/tP5xHYX0FQCSbfgioqBvfPKW:DdKSjVP5VKdgi5vfSW
Checks for missing Authenticode signature.
resource |
---|
0eb7d6d8994cdc76f5f1da868c06a956_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
LocalFree
CreateThread
DeleteFileA
FreeLibrary
GetProcAddress
LoadLibraryA
WideCharToMultiByte
GetExitCodeProcess
CloseHandle
GetModuleFileNameA
CreateProcessA
GetSystemDirectoryA
MoveFileA
SetFileAttributesA
FindNextFileA
GetPrivateProfileStringA
FindFirstFileA
WritePrivateProfileStringA
Process32Next
Process32First
RemoveDirectoryA
ExitProcess
GetModuleHandleA
GetShortPathNameA
lstrlenA
MultiByteToWideChar
lstrlenW
HeapDestroy
InterlockedDecrement
EnterCriticalSection
InterlockedIncrement
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
DisableThreadLibraryCalls
GetCommandLineW
CreateDirectoryA
Sleep
GetCurrentProcessId
WaitForSingleObject
GetNamedSecurityInfoA
BuildExplicitAccessWithNameA
SetEntriesInAclA
SetNamedSecurityInfoA
RegDeleteKeyA
RegQueryInfoKeyA
RegEnumKeyExA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
RegCreateKeyExA
RegSetValueExA
SHGetSpecialFolderPathA
CommandLineToArgvW
CoGetInterfaceAndReleaseStream
CoCreateInstance
CoMarshalInterThreadInterfaceInStream
CoInitialize
CoUninitialize
VariantClear
SysAllocString
SysStringLen
LoadRegTypeLi
SysFreeString
fclose
_strupr
_stricmp
_adjust_fdiv
malloc
_initterm
free
strncmp
strncpy
strchr
atoi
strcpy
_wcslwr
wcsstr
strlen
sprintf
strstr
??3@YAXPAX@Z
_access
strcat
memcpy
_purecall
??2@YAPAXI@Z
memcmp
strcmp
strrchr
_strlwr
fread
memset
ftell
fseek
fopen
SHSetValueA
SHDeleteKeyA
SHDeleteValueA
DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ