DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
53da5d509c5ab40fefe0480ed4f641d2_JaffaCakes118.dll
Resource
win7-20240903-en
Target
53da5d509c5ab40fefe0480ed4f641d2_JaffaCakes118
Size
68KB
MD5
53da5d509c5ab40fefe0480ed4f641d2
SHA1
3da2b066e198639636bbf7894e6c3cf261c39db2
SHA256
021be88e5ccff828062679b92b06dc1defda0d602a596fe3905bc96da9cfd9f6
SHA512
ba2ff0e2ba4ec3071146c1ffa703b10417204ebe9055088c6c6b1e39406c136a70491cebe4fa75948f19aa8ab60082b100715c0173bb679052f098e8717e0377
SSDEEP
1536:bgCFd1jXtzgKQEzvxiTXapO1gIDTcBV5k:7F9zgKQdTGIDTSV5
Checks for missing Authenticode signature.
resource |
---|
53da5d509c5ab40fefe0480ed4f641d2_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetModuleHandleA
GetModuleFileNameA
GetCommandLineW
FreeLibrary
GetProcAddress
LoadLibraryA
WideCharToMultiByte
Sleep
CreateThread
MoveFileA
SetFileAttributesA
GetShortPathNameA
WritePrivateProfileStringA
CreateProcessA
RemoveDirectoryA
ExitProcess
Process32Next
Process32First
CreateDirectoryA
GetExitCodeProcess
WaitForSingleObject
GetSystemDirectoryA
lstrlenA
MultiByteToWideChar
lstrlenW
HeapDestroy
InterlockedDecrement
EnterCriticalSection
InterlockedIncrement
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
DisableThreadLibraryCalls
FindFirstFileA
GetPrivateProfileStringA
DeleteFileA
FindNextFileA
LocalFree
GetCurrentProcessId
CloseHandle
RegDeleteKeyA
RegQueryValueExA
RegOpenKeyExA
RegQueryInfoKeyA
RegEnumKeyExA
RegCloseKey
GetNamedSecurityInfoA
BuildExplicitAccessWithNameA
SetEntriesInAclA
SetNamedSecurityInfoA
RegCreateKeyExA
RegSetValueExA
SHGetSpecialFolderPathA
CommandLineToArgvW
CoMarshalInterThreadInterfaceInStream
CoUninitialize
CoGetInterfaceAndReleaseStream
CoInitialize
CoCreateInstance
VariantClear
SysAllocString
SysStringLen
LoadRegTypeLi
SysFreeString
memcmp
_strlwr
_stricmp
_adjust_fdiv
malloc
_initterm
free
strcmp
_access
atoi
strcpy
strlen
strncmp
strchr
strncpy
strcat
sprintf
??3@YAXPAX@Z
memset
wcsstr
_wcslwr
strstr
strrchr
memcpy
_purecall
??2@YAPAXI@Z
_strupr
fclose
fread
ftell
fseek
fopen
SHSetValueA
SHDeleteValueA
SHDeleteKeyA
DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ