DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
55890e8505c85d857f35d48e83c772f5_JaffaCakes118.dll
Resource
win7-20240903-en
Target
55890e8505c85d857f35d48e83c772f5_JaffaCakes118
Size
36KB
MD5
55890e8505c85d857f35d48e83c772f5
SHA1
694cb7cc21e0e2783f0c3c71ae8ee264711d0cc9
SHA256
b2d03f46e4e16591045826654444c3f95d1a0eee44aad577a7a6ca780771d8b3
SHA512
0f42360a067e444cb3439537d32a833cf15a0720ff20ee2cf4d78a8d79670eaba460c5cd2c509bf2c8353def3448bb8cda53d04df1f717b2051117042d05b921
SSDEEP
384:ngjrG0/RvZJiZ9bBj2PF3VvBv8/jAPlWBpuGjGUpYQ63xJ6Ix:nqyCRvZJiZVAdFvBv8LW4BpuTMYBxgS
Checks for missing Authenticode signature.
resource |
---|
55890e8505c85d857f35d48e83c772f5_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
LoadLibraryA
MultiByteToWideChar
lstrlenA
WideCharToMultiByte
lstrlenW
DisableThreadLibraryCalls
InitializeCriticalSection
DeleteCriticalSection
LeaveCriticalSection
InterlockedIncrement
EnterCriticalSection
InterlockedDecrement
HeapDestroy
FreeLibrary
GetModuleHandleA
CreateThread
GetCommandLineW
Process32Next
Process32First
CreateToolhelp32Snapshot
GetCurrentProcessId
FindNextFileA
FindFirstFileA
MoveFileA
DeleteFileA
SetFileAttributesA
GetSystemDirectoryA
GetModuleFileNameA
CreateProcessA
WaitForSingleObject
CloseHandle
GetExitCodeProcess
Sleep
GetShortPathNameA
ExitProcess
SetWindowTextA
SendMessageA
FindWindowExA
IsWindow
RegCloseKey
RegCreateKeyExA
RegDeleteKeyA
RegEnumKeyExA
RegQueryInfoKeyA
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
SHGetSpecialFolderPathA
CommandLineToArgvW
CoCreateInstance
CoInitialize
VariantClear
SysStringLen
LoadRegTypeLi
SysAllocString
SysFreeString
_stricmp
_strupr
_strlwr
_adjust_fdiv
malloc
_initterm
free
strcat
strrchr
strcpy
strlen
strstr
_wcslwr
wcsstr
??2@YAPAXI@Z
_purecall
memcpy
??3@YAXPAX@Z
memset
sprintf
memcmp
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ