DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
2c92b3b12aa30803bb3e52c677bfea39_JaffaCakes118.dll
Resource
win7-20240903-en
Target
2c92b3b12aa30803bb3e52c677bfea39_JaffaCakes118
Size
80KB
MD5
2c92b3b12aa30803bb3e52c677bfea39
SHA1
b3867cb682779e210ef64930d28f5e36ed72f7fd
SHA256
45901dee24d41a0c0edc840084fa3d49899cd6d803e5e246d66da9108b232a0b
SHA512
a4f65fa36902f3e79286c38378284d99bee46bba55f5005e94b10d73855cbbb6c9e52553a07357a10a26ccc7f785a2c7bb56dbfc97100a06a7cc8b89272de2dd
SSDEEP
768:GwvdV935r42SIeMn/dBo5Z292VUxeqQ5GqlMbRu0bLZ94MF8pOlWlgx7dLN:fV9JFLeMaZ292VUnWBl503E9pnl25LN
Checks for missing Authenticode signature.
resource |
---|
2c92b3b12aa30803bb3e52c677bfea39_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
MultiByteToWideChar
lstrlenA
WideCharToMultiByte
GetExitCodeProcess
CloseHandle
WaitForSingleObject
GetSystemDirectoryA
Process32Next
Process32First
WritePrivateProfileStringA
ExitProcess
GetCurrentProcessId
LeaveCriticalSection
EnterCriticalSection
GetCommandLineW
MoveFileA
DisableThreadLibraryCalls
InitializeCriticalSection
DeleteCriticalSection
InterlockedIncrement
InterlockedDecrement
HeapDestroy
GetShortPathNameA
GetModuleHandleA
lstrlenW
GetProcAddress
CreateDirectoryA
GetModuleFileNameA
LoadLibraryA
FreeLibrary
RemoveDirectoryA
CreateProcessA
SetFileAttributesA
LocalFree
Sleep
FindFirstFileA
GetPrivateProfileStringA
FindNextFileA
DeleteFileA
CreateThread
RegOpenKeyExA
RegQueryValueExA
RegQueryInfoKeyA
RegEnumKeyExA
RegDeleteKeyA
RegCloseKey
BuildExplicitAccessWithNameA
SetEntriesInAclA
GetNamedSecurityInfoA
SetNamedSecurityInfoA
RegCreateKeyExA
RegSetValueExA
SHGetSpecialFolderPathA
CommandLineToArgvW
CoUninitialize
CoInitialize
CoMarshalInterThreadInterfaceInStream
CoGetInterfaceAndReleaseStream
CoCreateInstance
SysStringLen
LoadRegTypeLi
VariantClear
SysAllocString
SysFreeString
strcat
_stricmp
_strlwr
_adjust_fdiv
malloc
_initterm
free
_purecall
_wcslwr
wcsstr
fopen
fseek
ftell
fread
fclose
memcpy
??3@YAXPAX@Z
strstr
strrchr
sprintf
strncpy
strchr
memset
strncmp
strlen
strcpy
_strupr
_access
atoi
strcmp
??2@YAPAXI@Z
memcmp
SHSetValueA
SHDeleteKeyA
SHDeleteValueA
DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ