??0IDefSdkVideoEffect@@QAE@ABV0@@Z
??0IDefSdkVideoEffect@@QAE@XZ
??4IDefSdkVideoEffect@@QAEAAV0@ABV0@@Z
??_7IDefSdkVideoEffect@@6B@
DefSdkCreateVideoEffect
Static task
static1
Behavioral task
behavioral1
Sample
073cd8f01296d2fb5e8be971e50f78f5_JaffaCakes118.dll
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
073cd8f01296d2fb5e8be971e50f78f5_JaffaCakes118.dll
Resource
win10v2004-20240226-en
Target
073cd8f01296d2fb5e8be971e50f78f5_JaffaCakes118
Size
194KB
MD5
073cd8f01296d2fb5e8be971e50f78f5
SHA1
87baf60011afd4328398fb0bab93e2c4226ef34d
SHA256
5e8d059e4e1fb45b2db8756a921a2647892d5139bf6baca6f080207b8a36e17a
SHA512
4e976acccf60dba2c33ab764f34e6ed2378c2dcb887208ae1e0874e3c5d3cdcdd141908ff9bf6e98a520d5a88918d767ffd280ee7beb118e120d4fbba831c744
SSDEEP
3072:DojoC3OgonEVPgZNXIzjMX3TXS1/+vvKeel1Tl7T8IGBBl0ppH9+GuY1lNkZ:OOgoEVPqNYzEcwov9YVS9uOs
Checks for missing Authenticode signature.
resource |
---|
073cd8f01296d2fb5e8be971e50f78f5_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
ord2638
ord3703
ord3713
ord3712
ord2527
ord2640
ord2534
ord2856
ord2708
ord4301
ord2829
ord2725
ord2531
ord5196
ord1955
ord5171
ord1353
ord4961
ord3339
ord6275
ord3796
ord6273
ord1513
ord2163
ord2169
ord2399
ord2381
ord2379
ord2402
ord2407
ord2388
ord2404
ord931
ord927
ord929
ord925
ord920
ord5956
ord1591
ord4276
ord4716
ord3397
ord4179
ord6271
ord5067
ord1899
ord5148
ord4238
ord3943
ord3940
ord1608
ord1611
ord5911
ord6721
ord4256
ord5199
ord1392
ord5908
ord6720
ord1661
ord1662
ord4884
ord4206
ord5178
ord3756
ord1542
ord2311
ord6063
ord1590
ord1646
ord1647
ord2397
ord2409
ord2386
ord2390
ord2392
ord2394
ord2384
ord5229
ord5231
ord4480
ord4255
ord3189
ord3678
ord3635
ord4574
ord1182
ord3435
ord1785
ord765
ord315
ord1079
ord1033
ord1087
ord1197
ord1199
ord1093
ord371
ord1908
ord1162
ord1115
ord1192
ord1168
ord1170
ord1200
ord1864
ord1085
ord4729
ord6232
ord1894
ord5210
ord6751
ord605
ord2011
ord572
ord354
ord314
ord620
ord762
ord1393
ord764
ord581
_amsg_exit
malloc
__CxxFrameHandler
free
_wtoi
_crt_debugger_hook
_except_handler4_common
__clean_type_info_names_internal
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_onexit
_lock
__dllonexit
_unlock
?terminate@@YAXXZ
__CppXcptFilter
_adjust_fdiv
realloc
_initterm_e
_initterm
_decode_pointer
_encoded_null
memset
_malloc_crt
_encode_pointer
__CxxFrameHandler3
_purecall
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
InterlockedCompareExchange
Sleep
InterlockedExchange
LocalAlloc
LocalFree
GetACP
GetLocaleInfoA
GetThreadLocale
GetVersionExA
RaiseException
InitializeCriticalSection
DeleteCriticalSection
IsDebuggerPresent
SendMessageW
EnableWindow
UnregisterClassA
??0IDefSdkVideoEffect@@QAE@ABV0@@Z
??0IDefSdkVideoEffect@@QAE@XZ
??4IDefSdkVideoEffect@@QAEAAV0@ABV0@@Z
??_7IDefSdkVideoEffect@@6B@
DefSdkCreateVideoEffect
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ