DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
3e0ec87ddc3b68493248ddfed6a60a42_JaffaCakes118.dll
Resource
win7-20240903-en
Target
3e0ec87ddc3b68493248ddfed6a60a42_JaffaCakes118
Size
36KB
MD5
3e0ec87ddc3b68493248ddfed6a60a42
SHA1
c54d6adbc6cad5b5499f3f7502f68b456d5cfa03
SHA256
f7fe8292bec237ef25f227cd27d3f74ead69d4b85be27f8bc07afa6dfb32d5fa
SHA512
36a58cd516c82ad1c2a32804fa3c01afa438784d481865836f6b637c6b1935774e4026df585c4c4a77b01f911f864106f396ada4cb1cd528af0d3f00d1994258
SSDEEP
768:mIcQu3ESXChz8AUrPZDHoFgapprH04S1YWASoiIOO:mIcQaShzDUDxypFUl14So
Checks for missing Authenticode signature.
resource |
---|
3e0ec87ddc3b68493248ddfed6a60a42_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
LoadLibraryA
MultiByteToWideChar
lstrlenA
WideCharToMultiByte
lstrlenW
LeaveCriticalSection
EnterCriticalSection
GetCommandLineW
CreateThread
FindNextFileA
FindFirstFileA
MoveFileA
DeleteFileA
SetFileAttributesA
InitializeCriticalSection
DeleteCriticalSection
InterlockedIncrement
InterlockedDecrement
HeapDestroy
GetShortPathNameA
GetModuleHandleA
Process32Next
Process32First
CreateToolhelp32Snapshot
GetCurrentProcessId
ExitProcess
FreeLibrary
GetSystemDirectoryA
GetModuleFileNameA
CreateProcessA
WaitForSingleObject
CloseHandle
GetExitCodeProcess
DisableThreadLibraryCalls
Sleep
SetWindowTextA
SendMessageA
FindWindowExA
IsWindow
RegCloseKey
RegOpenKeyExA
RegDeleteKeyA
RegEnumKeyExA
RegQueryInfoKeyA
RegSetValueExA
RegCreateKeyExA
RegQueryValueExA
SHGetSpecialFolderPathA
CommandLineToArgvW
CoCreateInstance
CoInitialize
VariantClear
SysStringLen
LoadRegTypeLi
SysAllocString
SysFreeString
_stricmp
_strupr
_strlwr
_adjust_fdiv
malloc
_initterm
free
strstr
strcpy
??2@YAPAXI@Z
_purecall
_wcslwr
wcsstr
strcat
memcpy
strlen
strrchr
??3@YAXPAX@Z
memset
sprintf
memcmp
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ