DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
4129aaf2a09fe0faa00e68407ab9c017_JaffaCakes118.dll
Resource
win7-20241010-en
Target
4129aaf2a09fe0faa00e68407ab9c017_JaffaCakes118
Size
72KB
MD5
4129aaf2a09fe0faa00e68407ab9c017
SHA1
b5832d87d734b2acd2499d7f6b42d555f399d3c1
SHA256
edee18cb15b4eea60102afa180e8c7b4770e437f001152f466f4f6be03cb914b
SHA512
86d79d7d4e7b67ba7926b5df28b5c573fcfd48fb384607119e3ca5fe60ebe4da013b93410ee8449890e045a9706f28d6bcbe4af81d51bb7f1500404ee6da9027
SSDEEP
768:FjlL+1xvdV65aEw2nMWo/HZrStySkgznoqRIT9OOZav6CBd5zzR272:fYdV65J9OvR7grlRIhOOZo9/p2y
Checks for missing Authenticode signature.
resource |
---|
4129aaf2a09fe0faa00e68407ab9c017_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Process32First
CreateDirectoryA
FindNextFileA
GetPrivateProfileStringA
FindFirstFileA
GetCommandLineW
GetProcAddress
DisableThreadLibraryCalls
InitializeCriticalSection
DeleteCriticalSection
LeaveCriticalSection
InterlockedIncrement
EnterCriticalSection
Process32Next
HeapDestroy
GetShortPathNameA
GetModuleHandleA
Sleep
LocalFree
RemoveDirectoryA
CreateThread
GetCurrentProcessId
WritePrivateProfileStringA
ExitProcess
LoadLibraryA
FreeLibrary
SetFileAttributesA
DeleteFileA
MoveFileA
lstrlenA
MultiByteToWideChar
lstrlenW
WideCharToMultiByte
GetSystemDirectoryA
GetModuleFileNameA
CreateProcessA
WaitForSingleObject
GetExitCodeProcess
CloseHandle
InterlockedDecrement
RegSetValueExA
GetNamedSecurityInfoA
BuildExplicitAccessWithNameA
SetEntriesInAclA
SetNamedSecurityInfoA
RegQueryValueExA
RegOpenKeyExA
RegQueryInfoKeyA
RegEnumKeyExA
RegCloseKey
RegDeleteKeyA
RegCreateKeyExA
CommandLineToArgvW
SHGetSpecialFolderPathA
CoUninitialize
CoGetInterfaceAndReleaseStream
CoCreateInstance
CoInitialize
CoMarshalInterThreadInterfaceInStream
SysFreeString
SysAllocString
SysStringLen
LoadRegTypeLi
VariantClear
SHSetValueA
SHDeleteValueA
SHDeleteKeyA
atoi
_stricmp
_strlwr
_adjust_fdiv
malloc
_initterm
free
strncmp
strncpy
fopen
fseek
ftell
fread
fclose
??2@YAPAXI@Z
_purecall
_wcslwr
wcsstr
strcat
_access
sprintf
memset
strlen
??3@YAXPAX@Z
memcmp
memcpy
_strupr
strchr
strstr
strcpy
strcmp
strrchr
DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ