DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
55091ad54b44a152731d8e9fb0f0482b_JaffaCakes118.dll
Resource
win7-20240729-en
Target
55091ad54b44a152731d8e9fb0f0482b_JaffaCakes118
Size
64KB
MD5
55091ad54b44a152731d8e9fb0f0482b
SHA1
7d4e783907a5604b65fb32d4ff628c3554e1de20
SHA256
665a246678df749fb6acb15e3453e64ddd3f82507ff826640c4f05b718c13a6e
SHA512
23dc8614ef5eb318dc1a7c7d5f9c5272c24283c9d3bd1c603fc41cc2cf77ea73019e845c051bb5f5363136c21e1a8ec718560e0fa7bec042d3cb63779c793cf4
SSDEEP
1536:LiBcKqnxv+eJDzv7lk9FtkONitWq3FL+eZrZvL:LiBcVrDzO9vsFzZNvL
Checks for missing Authenticode signature.
resource |
---|
55091ad54b44a152731d8e9fb0f0482b_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetCommandLineW
CloseHandle
Process32Next
Process32First
FreeLibrary
LoadLibraryA
CreateDirectoryA
Sleep
WritePrivateProfileStringA
GetProcAddress
FindNextFileA
WideCharToMultiByte
GetPrivateProfileStringA
FindFirstFileA
CreateThread
MoveFileA
LocalFree
GetExitCodeProcess
WaitForSingleObject
GetSystemDirectoryA
GetCurrentProcessId
ExitProcess
DeleteFileA
RemoveDirectoryA
CreateProcessA
GetModuleFileNameA
GetModuleHandleA
GetShortPathNameA
lstrlenA
MultiByteToWideChar
lstrlenW
HeapDestroy
InterlockedDecrement
EnterCriticalSection
InterlockedIncrement
LeaveCriticalSection
DeleteCriticalSection
DisableThreadLibraryCalls
InitializeCriticalSection
SetFileAttributesA
BuildExplicitAccessWithNameA
RegSetValueExA
SetEntriesInAclA
GetNamedSecurityInfoA
SetNamedSecurityInfoA
RegQueryValueExA
RegOpenKeyExA
RegQueryInfoKeyA
RegEnumKeyExA
RegCloseKey
RegDeleteKeyA
RegCreateKeyExA
SHGetSpecialFolderPathA
CommandLineToArgvW
CoUninitialize
CoInitialize
CoMarshalInterThreadInterfaceInStream
CoGetInterfaceAndReleaseStream
CoCreateInstance
VariantClear
SysAllocString
SysStringLen
LoadRegTypeLi
SysFreeString
strcpy
_stricmp
_strlwr
_adjust_fdiv
malloc
_initterm
free
strcmp
_wcslwr
wcsstr
atoi
strncmp
strchr
strncpy
strrchr
fopen
memcpy
_purecall
??3@YAXPAX@Z
??2@YAPAXI@Z
memcmp
strstr
sprintf
memset
strlen
strcat
_strupr
_access
fclose
fread
ftell
fseek
SHSetValueA
SHDeleteKeyA
SHDeleteValueA
DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ