DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
cfi_Inject
cfi_StartHook
cfi_StopHook
Static task
static1
Behavioral task
behavioral1
Sample
045969da90d8e3dcc94bcfce5a472835_JaffaCakes118.dll
Resource
win7-20240508-en
Target
045969da90d8e3dcc94bcfce5a472835_JaffaCakes118
Size
192KB
MD5
045969da90d8e3dcc94bcfce5a472835
SHA1
13e4126e13e0f3742f22903e2f74cd7eb5600d12
SHA256
d8df856aee2d4c75db3ea8ba096fd49de29810274c395762644e161cac965ae9
SHA512
696c00165ece91eb98ebf5af26fd19cf4b69e2fa2fabba4a262e847f77cb8da7bb1088cda89c2300d9588e6d3dd5fbce927696c0b9970151a52c3b393ce7dc91
SSDEEP
3072:p9NkAs3vNMzIduJ0fUq1mp5WeT9u7dlHsNr/r:HNkAsFSlqYjWH7O
Checks for missing Authenticode signature.
resource |
---|
045969da90d8e3dcc94bcfce5a472835_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
SetEndOfFile
GetOEMCP
GetACP
SetFilePointer
FlushFileBuffers
SetStdHandle
GetStringTypeW
GetStringTypeA
GetCPInfo
IsBadCodePtr
IsBadReadPtr
SetUnhandledExceptionFilter
WriteFile
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetFileType
GetStdHandle
SetHandleCount
IsBadWritePtr
VirtualAlloc
VirtualFree
HeapCreate
ReadFile
HeapSize
TerminateProcess
LCMapStringW
LCMapStringA
ExitProcess
TlsGetValue
SetLastError
TlsFree
TlsAlloc
TlsSetValue
GetVersion
GetCommandLineA
HeapReAlloc
HeapAlloc
RtlUnwind
InterlockedExchange
Sleep
UnmapViewOfFile
CreateFileA
CreateFileMappingA
MapViewOfFile
WinExec
IsDBCSLeadByte
LoadLibraryExA
FindResourceA
LoadResource
SizeofResource
HeapDestroy
InterlockedIncrement
DeleteCriticalSection
InitializeCriticalSection
DisableThreadLibraryCalls
CreateMutexA
GetLastError
GetShortPathNameA
FreeLibrary
FindFirstFileW
FindNextFileW
FindClose
ExpandEnvironmentStringsW
LocalFree
lstrcatW
GetModuleFileNameW
LoadLibraryW
lstrcmpiW
lstrcpynW
lstrlenW
GetProcessHeap
HeapFree
WriteProcessMemory
CreateToolhelp32Snapshot
Module32First
Module32Next
lstrlenA
lstrcmpiA
GetCurrentProcessId
CloseHandle
OpenProcess
GetModuleFileNameA
lstrcatA
GetSystemDefaultLangID
GetPrivateProfileIntA
GetPrivateProfileStringA
lstrcpyW
lstrcmpA
lstrcpyA
WideCharToMultiByte
MultiByteToWideChar
lstrcpynA
GetModuleHandleA
GetVersionExA
InterlockedDecrement
EnterCriticalSection
LeaveCriticalSection
GetCurrentProcess
FlushInstructionCache
GetCurrentThreadId
LoadLibraryA
GetProcAddress
GetStartupInfoA
SetWindowTextA
GetCursorPos
SetTimer
UpdateWindow
DefWindowProcA
IsWindow
GetWindowRect
GetDlgCtrlID
GetWindowTextW
GetWindowTextLengthW
SetWindowTextW
PostMessageW
SendMessageW
DrawTextW
FindWindowExW
LoadImageW
LoadIconW
FindWindowW
GetClassNameW
SetWindowsHookExW
wsprintfW
CharNextA
DrawIconEx
GetWindowDC
LoadImageA
GetWindowThreadProcessId
FillRect
GetFocus
LoadIconA
DestroyIcon
FindWindowExA
GetSysColor
SendMessageA
GetWindowTextLengthA
SetFocus
LoadBitmapA
CallWindowProcW
SetWindowLongW
GetClassNameA
GetParent
GetWindowLongW
FindWindowA
GetSystemMetrics
GetClassInfoExA
LoadCursorA
wsprintfA
RegisterClassExA
ReleaseDC
EndPaint
CreateWindowExA
CallWindowProcA
GetWindowLongA
SetWindowLongA
CallNextHookEx
UnhookWindowsHookEx
SetWindowsHookExA
ReleaseCapture
SetCapture
PtInRect
GetDC
InflateRect
BeginPaint
SystemParametersInfoA
ShowWindow
PostMessageA
MoveWindow
SetWindowRgn
ScreenToClient
OffsetRect
SetRectEmpty
GetClientRect
DrawFrameControl
GetWindowTextA
DrawTextA
IsRectEmpty
CopyRect
KillTimer
SetStretchBltMode
StretchBlt
ExtTextOutA
GetStockObject
GetObjectA
CreateFontIndirectA
DeleteObject
SetBkColor
SelectObject
CreateCompatibleDC
SetTextColor
SetBkMode
FrameRgn
OffsetRgn
CreateSolidBrush
ExcludeClipRect
SetWindowOrgEx
GetClipBox
BitBlt
EqualRgn
CombineRgn
CreateRectRgn
CreatePolygonRgn
SetViewportOrgEx
GetViewportOrgEx
SetPixel
GetTextExtentPoint32A
GetTextExtentPointA
GetTextExtentPoint32W
GetTextExtentPointW
DeleteDC
CreateCompatibleBitmap
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
RegQueryInfoKeyA
RegEnumValueA
RegSetValueExA
RegCreateKeyExA
RegDeleteKeyA
RegQueryValueExW
RegEnumKeyExW
RegQueryInfoKeyW
RegOpenKeyExW
RegDeleteValueA
RegDeleteKeyW
RegCreateKeyExW
RegSetValueExW
RegEnumValueW
RegEnumKeyExA
SHGetDesktopFolder
SHGetSpecialFolderPathW
SHGetMalloc
SHGetSpecialFolderLocation
ShellExecuteA
CoTaskMemAlloc
CoFreeUnusedLibraries
CoInitialize
CoCreateInstance
CoUninitialize
CoTaskMemFree
CoTaskMemRealloc
RegisterTypeLi
LoadTypeLi
SysAllocString
SysFreeString
OleTranslateColor
SysStringLen
VarUI4FromStr
LoadRegTypeLi
UrlApplySchemeW
StrRetToBufW
PathIsURLW
StrCpyW
StrDupW
StrStrW
StrStrIW
StrStrA
StrStrIA
StrCmpW
StrRStrIW
PathFileExistsW
PathIsDirectoryW
StrCmpNIW
StrDupA
PathAppendA
PathRemoveFileSpecA
StrNCatW
StrCmpIW
InternetCrackUrlW
ImageList_AddMasked
ImageList_Create
ImageList_Draw
ImageList_SetBkColor
ImageList_GetIconSize
ImageList_ReplaceIcon
ImageList_Remove
ImageList_Destroy
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
cfi_Inject
cfi_StartHook
cfi_StopHook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ