DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
133946f961059957299aed7f02e63fb9_JaffaCakes118.dll
Resource
win7-20240903-en
Target
133946f961059957299aed7f02e63fb9_JaffaCakes118
Size
72KB
MD5
133946f961059957299aed7f02e63fb9
SHA1
58aa147f52ab56a6ea725ed7efb48fb16ad6aa94
SHA256
9bcf856b61ce4d4edd31f5e9d036830f3b26ef09975bc009bf8517863e3b72e9
SHA512
c4ce4f810fbaf43ae95926220cdd70084ae96b4ebf30225a13cc58bdfd49772421458c9dc922f9697a61ca2abbc9458bb724000d837f02a6077db65efc3ffddc
SSDEEP
1536:npLjMQe+LzwwyA+0g9G+la88h9iILRjfhxT2r3kla6z:pLT1yAjxkPYiILLJ2r3klr
Checks for missing Authenticode signature.
resource |
---|
133946f961059957299aed7f02e63fb9_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
WideCharToMultiByte
CreateDirectoryA
FreeLibrary
GetProcAddress
LoadLibraryA
CloseHandle
Sleep
LocalFree
CreateProcessA
GetSystemDirectoryA
GetExitCodeProcess
GetModuleFileNameA
CreateThread
WritePrivateProfileStringA
GetCurrentProcessId
Process32Next
Process32First
ExitProcess
MoveFileA
SetFileAttributesA
GetCommandLineW
RemoveDirectoryA
GetModuleHandleA
GetShortPathNameA
lstrlenA
MultiByteToWideChar
lstrlenW
HeapDestroy
InterlockedDecrement
EnterCriticalSection
InterlockedIncrement
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
DisableThreadLibraryCalls
FindFirstFileA
GetPrivateProfileStringA
FindNextFileA
DeleteFileA
WaitForSingleObject
RegCreateKeyExA
RegSetValueExA
GetNamedSecurityInfoA
BuildExplicitAccessWithNameA
SetEntriesInAclA
SetNamedSecurityInfoA
RegQueryInfoKeyA
RegEnumKeyExA
RegDeleteKeyA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
SHGetSpecialFolderPathA
CommandLineToArgvW
CoMarshalInterThreadInterfaceInStream
CoGetInterfaceAndReleaseStream
CoInitialize
CoUninitialize
CoCreateInstance
VariantClear
SysAllocString
SysStringLen
LoadRegTypeLi
SysFreeString
strlen
_stricmp
_strlwr
_adjust_fdiv
malloc
_initterm
free
fopen
fseek
ftell
fread
fclose
strcmp
_wcslwr
wcsstr
atoi
strstr
strrchr
sprintf
memcpy
_purecall
??3@YAXPAX@Z
??2@YAPAXI@Z
memcmp
_access
strcat
_strupr
memset
strcpy
strncpy
strchr
strncmp
SHDeleteValueA
SHDeleteKeyA
SHSetValueA
DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ