DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
14e118858e640284b0aa0e4d43cb940b_JaffaCakes118.dll
Resource
win7-20240903-en
Target
14e118858e640284b0aa0e4d43cb940b_JaffaCakes118
Size
52KB
MD5
14e118858e640284b0aa0e4d43cb940b
SHA1
6f78c1c91d515ae5f5b8153657c028b7243b30bb
SHA256
6dcb58a777ced904845f0dd11539833ba8d60939c5fe2e6a5a1a58f15fdeab36
SHA512
1f4fb6764c8cbb515ea21248a4366c516a9a0177018d2d1ec5b5092697bcba486434825009a30990b5778bf8151bf4727c768c5651a43bd2cd1d22b155f107cc
SSDEEP
768:facTOjS5ChfWXbJeR++eyMl5Dsk/tPbeDQWMW4XZtty5eGJ0bqMgK:ScTOjS8VggRde5z3lybMLh+8qMgK
Checks for missing Authenticode signature.
resource |
---|
14e118858e640284b0aa0e4d43cb940b_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetPrivateProfileStringA
FindFirstFileA
CloseHandle
GetSystemDirectoryA
GetCommandLineW
CreateDirectoryA
WritePrivateProfileStringA
GetExitCodeProcess
WaitForSingleObject
GetCurrentProcessId
Process32Next
Process32First
LeaveCriticalSection
FindNextFileA
ExitProcess
DisableThreadLibraryCalls
InitializeCriticalSection
DeleteCriticalSection
InterlockedIncrement
InterlockedDecrement
HeapDestroy
GetShortPathNameA
GetModuleHandleA
Sleep
CreateThread
CreateProcessA
lstrlenA
LoadLibraryA
GetProcAddress
FreeLibrary
LocalFree
MultiByteToWideChar
SetFileAttributesA
DeleteFileA
MoveFileA
lstrlenW
WideCharToMultiByte
GetModuleFileNameA
EnterCriticalSection
RegQueryInfoKeyA
RegEnumKeyExA
RegDeleteKeyA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
BuildExplicitAccessWithNameA
SetEntriesInAclA
GetNamedSecurityInfoA
SetNamedSecurityInfoA
RegQueryValueExA
RegOpenKeyExA
SHGetSpecialFolderPathA
CommandLineToArgvW
CoInitialize
CoUninitialize
CoGetInterfaceAndReleaseStream
CoMarshalInterThreadInterfaceInStream
CoCreateInstance
SysStringLen
LoadRegTypeLi
VariantClear
SysAllocString
SysFreeString
fclose
_strupr
_strlwr
_adjust_fdiv
malloc
_initterm
free
_purecall
strcmp
strncmp
strncpy
strchr
atoi
_access
_wcslwr
wcsstr
sprintf
memset
strlen
??3@YAXPAX@Z
memcmp
strcat
strcpy
strstr
memcpy
strrchr
_stricmp
fread
??2@YAPAXI@Z
ftell
fseek
fopen
SHSetValueA
SHDeleteKeyA
SHDeleteValueA
DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ