DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
2d070fb2f8291b4213ce4cddb4a0bb13_JaffaCakes118.dll
Resource
win7-20240903-en
Target
2d070fb2f8291b4213ce4cddb4a0bb13_JaffaCakes118
Size
72KB
MD5
2d070fb2f8291b4213ce4cddb4a0bb13
SHA1
e3cf0b6bbcb4860ca31bfd18438fcd7240c16039
SHA256
7d732368810dd3317273157d62179c283e95d42c4f57f745479be1a267cc061f
SHA512
959e512cb145a9336229821696ebb4c3ca8c8e92e0a9e37dc98a123171b57721c638cc59243a21ed654e56064fe6fec3df78925d04aa5202a95db0882caed532
SSDEEP
1536:UrSBVzWRRBSCrTEgqXsKZ924Ww6tX8+PJyZ6O/TqNl3:12VEdXnqRByPqNl3
Checks for missing Authenticode signature.
resource |
---|
2d070fb2f8291b4213ce4cddb4a0bb13_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
EnterCriticalSection
WritePrivateProfileStringA
FindNextFileA
GetPrivateProfileStringA
FindFirstFileA
lstrlenA
GetCurrentProcessId
GetExitCodeProcess
WaitForSingleObject
CreateThread
RemoveDirectoryA
FreeLibrary
Sleep
LeaveCriticalSection
DisableThreadLibraryCalls
InitializeCriticalSection
DeleteCriticalSection
InterlockedIncrement
InterlockedDecrement
HeapDestroy
GetShortPathNameA
GetModuleHandleA
GetCommandLineW
Process32Next
Process32First
lstrlenW
WideCharToMultiByte
LoadLibraryA
GetProcAddress
GetSystemDirectoryA
GetModuleFileNameA
CreateProcessA
CloseHandle
ExitProcess
MultiByteToWideChar
DeleteFileA
MoveFileA
CreateDirectoryA
LocalFree
SetFileAttributesA
RegQueryValueExA
RegOpenKeyExA
RegQueryInfoKeyA
RegEnumKeyExA
RegDeleteKeyA
RegCloseKey
BuildExplicitAccessWithNameA
SetEntriesInAclA
GetNamedSecurityInfoA
SetNamedSecurityInfoA
RegCreateKeyExA
RegSetValueExA
SHGetSpecialFolderPathA
CommandLineToArgvW
CoInitialize
CoUninitialize
CoGetInterfaceAndReleaseStream
CoMarshalInterThreadInterfaceInStream
CoCreateInstance
SysStringLen
LoadRegTypeLi
SysAllocString
VariantClear
SysFreeString
fclose
_strupr
_strlwr
_adjust_fdiv
malloc
_initterm
free
_purecall
_wcslwr
wcsstr
memcpy
memcmp
strncmp
strncpy
strchr
atoi
strstr
_access
strcat
sprintf
strlen
??3@YAXPAX@Z
??2@YAPAXI@Z
memset
strcmp
strrchr
_stricmp
fread
ftell
fseek
fopen
strcpy
SHSetValueA
SHDeleteKeyA
SHDeleteValueA
DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ