DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
Static task
static1
Behavioral task
behavioral1
Sample
55ee83c2b6b53632605768d5d3268921_JaffaCakes118.dll
Resource
win7-20240729-en
Target
55ee83c2b6b53632605768d5d3268921_JaffaCakes118
Size
60KB
MD5
55ee83c2b6b53632605768d5d3268921
SHA1
c212a677aaf98cc4992e2685933ed93ba5145e2b
SHA256
ad4219e81db3df01f46314c39a4bfa47113aa502f9395640f63d0cc6e539140e
SHA512
c836d4b8e39b08e051e3cd5fa4e2cb2fb23cec06a8d11f0b967153e5d5cc6ee08fcb11b3c820b6a7c375444c23597375d4dc987d657f41ffed8eb6e0e6d04dc3
SSDEEP
1536:PaKPmVGLrL98sm1ohmZerWMhcxygJZrpoK:IQLY1bejhcsgJhpoK
Checks for missing Authenticode signature.
resource |
---|
55ee83c2b6b53632605768d5d3268921_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Process32First
FindNextFileA
DeleteFileA
SetFileAttributesA
GetPrivateProfileStringA
FindFirstFileA
MoveFileA
MultiByteToWideChar
lstrlenA
ExitProcess
GetProcAddress
Process32Next
lstrlenW
CreateThread
DisableThreadLibraryCalls
InitializeCriticalSection
DeleteCriticalSection
InterlockedIncrement
InterlockedDecrement
HeapDestroy
GetShortPathNameA
GetModuleHandleA
CreateDirectoryA
EnterCriticalSection
LeaveCriticalSection
GetSystemDirectoryA
CreateProcessA
WaitForSingleObject
CloseHandle
GetExitCodeProcess
GetModuleFileNameA
LoadLibraryA
FreeLibrary
GetCommandLineW
LocalFree
Sleep
GetCurrentProcessId
WritePrivateProfileStringA
WideCharToMultiByte
RegCreateKeyExA
RegSetValueExA
RegQueryValueExA
GetNamedSecurityInfoA
BuildExplicitAccessWithNameA
SetEntriesInAclA
SetNamedSecurityInfoA
RegOpenKeyExA
RegQueryInfoKeyA
RegEnumKeyExA
RegDeleteKeyA
RegCloseKey
CommandLineToArgvW
SHGetSpecialFolderPathA
CoGetInterfaceAndReleaseStream
CoCreateInstance
CoMarshalInterThreadInterfaceInStream
CoInitialize
CoUninitialize
SysStringLen
LoadRegTypeLi
SysAllocString
VariantClear
SysFreeString
strcat
_strlwr
_stricmp
_adjust_fdiv
malloc
_initterm
free
strncmp
strncpy
_access
_purecall
memcpy
fopen
fseek
ftell
fread
sprintf
??3@YAXPAX@Z
strstr
strcmp
strrchr
memset
wcsstr
_wcslwr
??2@YAPAXI@Z
strlen
_strupr
strcpy
memcmp
atoi
strchr
fclose
SHDeleteValueA
SHDeleteKeyA
SHSetValueA
DllCanUnloadNow
DllGetClassObject
DllGetObjectType
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ