ConvertToExifTiffeX
CopyClickWBCoefs
CreateBlockReaderInterface
D3D10SetDirect3DDevice
D3D9GetDevice
D3D9ResourceGetMappedArray
EjectLoadCD
EnumDeviceRelease
EnumImageItemPropertyReset
GetDriveMode
GetMyColorDataProps
HostAlloc
Malloc
Memcpy2D
Static task
static1
Behavioral task
behavioral1
Sample
08799e1a55f4a898a1e4d51db98f6e30_JaffaCakes118.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
08799e1a55f4a898a1e4d51db98f6e30_JaffaCakes118.dll
Resource
win10v2004-20240508-en
Target
08799e1a55f4a898a1e4d51db98f6e30_JaffaCakes118
Size
361KB
MD5
08799e1a55f4a898a1e4d51db98f6e30
SHA1
66a0b9bb8d375052836d669923291146929893b3
SHA256
bc4b425d60740fdb8e026fa67c5277b573b5bd29f3e17bd55d6ac1136c8c952a
SHA512
c9e4501cb9556397341cd784e1d0146d895cd59feb7f385a7bbbd39fac573bdcfe35deff75f66d6d89357d12528d67d3a50319f999570aeaf68feaa2183de53f
SSDEEP
6144:wv+3LD/D9wqoaAVVEztDcWtJ5UWxWTG3MhQB9a7MKc03aBYC7jROfj:co/798a9Nacc79c1J7O
Checks for missing Authenticode signature.
resource |
---|
08799e1a55f4a898a1e4d51db98f6e30_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
DisableThreadLibraryCalls
GetShortPathNameA
GetModuleHandleA
GetModuleFileNameA
DeleteCriticalSection
FreeLibrary
SizeofResource
LoadResource
FindResourceA
GetLastError
LoadLibraryExA
lstrcmpiA
InterlockedDecrement
InitializeCriticalSection
HeapDestroy
GetProcAddress
LoadLibraryA
lstrcatA
SetEnvironmentVariableA
ResumeThread
CreateThread
WaitForSingleObject
InterlockedIncrement
lstrcpyA
lstrlenA
CloseHandle
lstrlenW
WideCharToMultiByte
MultiByteToWideChar
EnterCriticalSection
IsDBCSLeadByte
lstrcpynA
HeapSize
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
GetOEMCP
WriteFile
GetEnvironmentStringsW
ExitProcess
TerminateProcess
SetLastError
TlsFree
TlsGetValue
GetVersion
GetCommandLineA
TlsAlloc
GetCurrentProcess
GetEnvironmentStrings
GetSystemTime
GetTimeZoneInformation
GetLocalTime
HeapAlloc
HeapReAlloc
RaiseException
ExitThread
TlsSetValue
HeapFree
RtlUnwind
InterlockedExchange
GetCurrentThreadId
UnhandledExceptionFilter
GetEnvironmentVariableA
Sleep
HeapCreate
VirtualFree
LeaveCriticalSection
GetVersionExA
FreeEnvironmentStringsW
GetACP
CompareStringW
CompareStringA
GetCPInfo
IsBadCodePtr
IsBadReadPtr
GetFileType
GetStdHandle
SetUnhandledExceptionFilter
FreeEnvironmentStringsA
GetStartupInfoA
IsBadWritePtr
VirtualAlloc
SetHandleCount
LoadStringA
CharNextA
RegQueryValueExA
RegEnumValueA
RegQueryInfoKeyA
RegSetValueExA
RegEnumKeyExA
RegOpenKeyExA
RegCloseKey
RegDeleteValueA
RegCreateKeyExA
RegDeleteKeyA
CoUninitialize
ProgIDFromCLSID
CoTaskMemFree
CoInitializeEx
CoTaskMemAlloc
CoCreateInstance
CoTaskMemRealloc
StringFromGUID2
VARIANT_UserFree
SystemTimeToVariantTime
VarDateFromUdate
SafeArrayGetDim
VariantChangeType
SafeArrayDestroy
SafeArrayCreate
SafeArrayGetLBound
SafeArrayGetUBound
VariantInit
SafeArrayAccessData
SafeArrayUnaccessData
VarUI4FromStr
RegisterTypeLi
LoadTypeLi
BSTR_UserUnmarshal
BSTR_UserSize
BSTR_UserMarshal
VARIANT_UserUnmarshal
BSTR_UserFree
VARIANT_UserSize
CreateErrorInfo
SysStringLen
LoadRegTypeLi
VariantCopy
SetErrorInfo
SysAllocStringLen
VariantClear
SysAllocString
SysFreeString
VARIANT_UserMarshal
VarUdateFromDate
CStdStubBuffer_Disconnect
IUnknown_AddRef_Proxy
IUnknown_Release_Proxy
IUnknown_QueryInterface_Proxy
NdrDllUnregisterProxy
NdrDllRegisterProxy
NdrCStdStubBuffer_Release
NdrDllCanUnloadNow
NdrDllGetClassObject
NdrOleAllocate
NdrOleFree
CStdStubBuffer_DebugServerQueryInterface
CStdStubBuffer_Connect
CStdStubBuffer_QueryInterface
CStdStubBuffer_AddRef
CStdStubBuffer_IsIIDSupported
CStdStubBuffer_DebugServerRelease
CStdStubBuffer_Invoke
CStdStubBuffer_CountRefs
GetFileVersionInfoSizeA
VerQueryValueA
GetFileVersionInfoA
ConvertToExifTiffeX
CopyClickWBCoefs
CreateBlockReaderInterface
D3D10SetDirect3DDevice
D3D9GetDevice
D3D9ResourceGetMappedArray
EjectLoadCD
EnumDeviceRelease
EnumImageItemPropertyReset
GetDriveMode
GetMyColorDataProps
HostAlloc
Malloc
Memcpy2D
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ