DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
170d5e8f12099805ac1b802014d6b251_JaffaCakes118.dll
Resource
win7-20240708-en
Target
170d5e8f12099805ac1b802014d6b251_JaffaCakes118
Size
36KB
MD5
170d5e8f12099805ac1b802014d6b251
SHA1
548b8c121885c8d41f6ea59feebdb9d8fffb71cf
SHA256
fcb4ec81c19aff01b41feb07ff9818cf5ed6a01fe8885a4423df8eccf3d31c69
SHA512
5b08f8ffc66c6c6f3f088ef99da2f68cb427410fef32baad8693f9ce7342193a3f6a533b3bab6c4dad19356bfc8638cfa2e97608eb00d481f22f61590289d9f4
SSDEEP
768:OIcQu3ESXChz8AUrPZDHoFgapprH04S1YWASoiIOO:OIcQaShzDUDxypFUl14So
Checks for missing Authenticode signature.
resource |
---|
170d5e8f12099805ac1b802014d6b251_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
LoadLibraryA
MultiByteToWideChar
lstrlenA
WideCharToMultiByte
lstrlenW
LeaveCriticalSection
EnterCriticalSection
GetCommandLineW
CreateThread
FindNextFileA
FindFirstFileA
MoveFileA
DeleteFileA
SetFileAttributesA
InitializeCriticalSection
DeleteCriticalSection
InterlockedIncrement
InterlockedDecrement
HeapDestroy
GetShortPathNameA
GetModuleHandleA
Process32Next
Process32First
CreateToolhelp32Snapshot
GetCurrentProcessId
ExitProcess
FreeLibrary
GetSystemDirectoryA
GetModuleFileNameA
CreateProcessA
WaitForSingleObject
CloseHandle
GetExitCodeProcess
DisableThreadLibraryCalls
Sleep
SetWindowTextA
SendMessageA
FindWindowExA
IsWindow
RegCloseKey
RegOpenKeyExA
RegDeleteKeyA
RegEnumKeyExA
RegQueryInfoKeyA
RegSetValueExA
RegCreateKeyExA
RegQueryValueExA
SHGetSpecialFolderPathA
CommandLineToArgvW
CoCreateInstance
CoInitialize
VariantClear
SysStringLen
LoadRegTypeLi
SysAllocString
SysFreeString
_stricmp
_strupr
_strlwr
_adjust_fdiv
malloc
_initterm
free
strstr
strcpy
??2@YAPAXI@Z
_purecall
_wcslwr
wcsstr
strcat
memcpy
strlen
strrchr
??3@YAXPAX@Z
memset
sprintf
memcmp
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ