DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
16f4c83dfaa0865f5c62b883f8df2149_JaffaCakes118.dll
Resource
win7-20240903-en
Target
16f4c83dfaa0865f5c62b883f8df2149_JaffaCakes118
Size
48KB
MD5
16f4c83dfaa0865f5c62b883f8df2149
SHA1
a772608aaef71eda9e6731412da47cc8bb5e504f
SHA256
a60c453aa133072f5276e2c7d04c2fe29d4eb00b69edb6a36953959fa04c4a73
SHA512
4d4325cdf3f377f8861aab4a7b1e45ee387200ce208d95e31175e07cbc97918ac76ae822b0e8f10451186fb810ab03cb26ff7f8e829450d06a4099074240d6c1
SSDEEP
768:p+2afGQmjyVfV1zV9KRSYAoFDZocP1ek3EgLgPkiBVdzcvQ/CQWLSeuF5UD:VAsjyV7RkAotTPak+dzB/C9uF5
Checks for missing Authenticode signature.
resource |
---|
16f4c83dfaa0865f5c62b883f8df2149_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
LoadLibraryA
MoveFileA
LocalFree
CloseHandle
Process32Next
Process32First
GetCommandLineW
Sleep
FreeLibrary
ExitProcess
GetCurrentProcessId
LeaveCriticalSection
EnterCriticalSection
GetProcAddress
DisableThreadLibraryCalls
InitializeCriticalSection
DeleteCriticalSection
InterlockedIncrement
InterlockedDecrement
HeapDestroy
GetShortPathNameA
GetModuleHandleA
CreateProcessA
GetSystemDirectoryA
CreateThread
GetExitCodeProcess
WaitForSingleObject
WritePrivateProfileStringA
GetModuleFileNameA
WideCharToMultiByte
lstrlenA
MultiByteToWideChar
lstrlenW
FindFirstFileA
GetPrivateProfileStringA
SetFileAttributesA
FindNextFileA
DeleteFileA
CreateDirectoryA
RegEnumKeyExA
RegQueryInfoKeyA
RegDeleteKeyA
GetNamedSecurityInfoA
BuildExplicitAccessWithNameA
SetEntriesInAclA
SetNamedSecurityInfoA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
RegCreateKeyExA
RegSetValueExA
CommandLineToArgvW
SHGetSpecialFolderPathA
CoInitialize
CoGetInterfaceAndReleaseStream
CoMarshalInterThreadInterfaceInStream
CoUninitialize
CoCreateInstance
VariantClear
SysStringLen
LoadRegTypeLi
SysAllocString
SysFreeString
memcpy
_strlwr
_strupr
_adjust_fdiv
malloc
_initterm
free
atoi
_purecall
_access
strcmp
strncmp
strchr
strncpy
??2@YAPAXI@Z
strcpy
??3@YAXPAX@Z
memset
strstr
strrchr
sprintf
strcat
memcmp
_stricmp
wcsstr
_wcslwr
strlen
SHDeleteKeyA
SHSetValueA
DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ