DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
145563f85e231ded543b97c7d6b06dd8_JaffaCakes118.dll
Resource
win7-20240704-en
Target
145563f85e231ded543b97c7d6b06dd8_JaffaCakes118
Size
68KB
MD5
145563f85e231ded543b97c7d6b06dd8
SHA1
60e8d31b1b462b9aaab91175b052a166985d5296
SHA256
c06eb421d1032258f4b7320874d9d0a4cfb75ebeca0153af840870408cd5e620
SHA512
14571cd16f2415e9cb9e9dcd19319caad8a771c91fe01f2225674b359634eca90d3e52a08382567ab72e9e73d3f50452c770ef69e7242133a58c1ba682d5f5c0
SSDEEP
1536:MvDC186Wk+WS6EiWAvjIdOAGMgULG6ozaChL1N:ML/bjZOA/gUC6oz3L1
Checks for missing Authenticode signature.
resource |
---|
145563f85e231ded543b97c7d6b06dd8_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
CreateThread
LeaveCriticalSection
EnterCriticalSection
FindNextFileA
GetPrivateProfileStringA
FindFirstFileA
GetExitCodeProcess
CloseHandle
WaitForSingleObject
CreateProcessA
GetSystemDirectoryA
WritePrivateProfileStringA
lstrlenA
RemoveDirectoryA
Process32Next
Process32First
DisableThreadLibraryCalls
InitializeCriticalSection
DeleteCriticalSection
InterlockedIncrement
InterlockedDecrement
HeapDestroy
GetShortPathNameA
GetModuleHandleA
GetCurrentProcessId
GetProcAddress
lstrlenW
WideCharToMultiByte
LocalFree
Sleep
CreateDirectoryA
GetModuleFileNameA
MultiByteToWideChar
SetFileAttributesA
DeleteFileA
MoveFileA
LoadLibraryA
ExitProcess
FreeLibrary
GetCommandLineW
RegSetValueExA
GetNamedSecurityInfoA
BuildExplicitAccessWithNameA
SetEntriesInAclA
SetNamedSecurityInfoA
RegQueryValueExA
RegOpenKeyExA
RegQueryInfoKeyA
RegEnumKeyExA
RegCloseKey
RegDeleteKeyA
RegCreateKeyExA
SHGetSpecialFolderPathA
CommandLineToArgvW
CoInitialize
CoGetInterfaceAndReleaseStream
CoMarshalInterThreadInterfaceInStream
CoUninitialize
CoCreateInstance
SysStringLen
LoadRegTypeLi
VariantClear
SysAllocString
SysFreeString
strncpy
_strupr
_strlwr
_adjust_fdiv
malloc
_initterm
free
_purecall
_wcslwr
wcsstr
memcpy
memcmp
fopen
fseek
ftell
??2@YAPAXI@Z
atoi
strchr
sprintf
strlen
strstr
strcmp
strrchr
_access
strcat
??3@YAXPAX@Z
_stricmp
memset
strncmp
strcpy
fclose
fread
SHSetValueA
SHDeleteValueA
SHDeleteKeyA
DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ