BAOOpenFile
D3D9RegisterVertexBuffer
GetMCCustomSetNumberCount
GetPreviousDeviceInfo
SetupArgument
Static task
static1
Behavioral task
behavioral1
Sample
0f08001380cc24e5214533e95e20872a_JaffaCakes118.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0f08001380cc24e5214533e95e20872a_JaffaCakes118.dll
Resource
win10v2004-20240611-en
Target
0f08001380cc24e5214533e95e20872a_JaffaCakes118
Size
260KB
MD5
0f08001380cc24e5214533e95e20872a
SHA1
d5fe58249313803a059b0ca0538b47a47a45efe7
SHA256
cda483a09884cd37bce7a552d70ba493e193d2731be8838682ac05317ce522f8
SHA512
8d29919317275336bbaeebd64eea2299a99baf590baa8187f1aec1fb7f2d9f456cf465a8821b10f103efe353f73cbc17d2027905399fe74a3bb2852346c050cf
SSDEEP
6144:jty1drP9DVAbuhay1TuWvoDZnoTzkcWni6Qw:RQky1TmcWi
Checks for missing Authenticode signature.
resource |
---|
0f08001380cc24e5214533e95e20872a_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
SetTextColor
SetBkColor
SelectObject
GetTextExtentPoint32A
DeleteObject
DeleteDC
CreateSolidBrush
CreateFontIndirectA
CreateDCA
FlushFileBuffers
FreeEnvironmentStringsA
FreeEnvironmentStringsW
FreeLibrary
GetACP
GetCPInfo
GetCommandLineA
GetConsoleCP
GetConsoleMode
GetConsoleOutputCP
GetCurrentDirectoryA
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetEnvironmentStringsA
GetEnvironmentStringsW
GetExitCodeProcess
GetFileAttributesA
GetFileSize
GetFileTime
GetFileType
GetLastError
GetLocaleInfoA
GetModuleFileNameA
GetModuleHandleA
GetModuleHandleW
GetOEMCP
GetProcAddress
GetProcessHeap
GetStartupInfoA
GetStdHandle
GetStringTypeA
GetStringTypeW
GetSystemTimeAsFileTime
GetTempFileNameA
GetTempPathA
GetTickCount
GetVersionExA
GlobalAlloc
GlobalLock
GlobalUnlock
FindResourceExA
HeapCreate
HeapDestroy
HeapFree
HeapReAlloc
HeapSize
InitializeCriticalSection
InterlockedDecrement
InterlockedIncrement
IsDebuggerPresent
IsValidCodePage
LCMapStringA
LCMapStringW
LeaveCriticalSection
LoadLibraryA
LoadResource
LocalAlloc
LocalFree
LocalLock
LocalUnlock
LockResource
MapViewOfFile
MulDiv
MultiByteToWideChar
QueryPerformanceCounter
RaiseException
ReadFile
SetEndOfFile
SetFilePointer
SetFileTime
SetHandleCount
SetLastError
SetStdHandle
SetUnhandledExceptionFilter
SizeofResource
Sleep
TerminateProcess
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
UnmapViewOfFile
VirtualAlloc
VirtualFree
WaitForSingleObject
WideCharToMultiByte
WriteConsoleA
WriteConsoleW
WriteFile
lstrlenA
FindResourceA
FindNextFileA
FindFirstFileA
FindClose
ExitThread
ExitProcess
EnterCriticalSection
DeleteFileA
DeleteCriticalSection
CreateThread
CreateProcessA
CreateFileMappingA
CreateFileA
CopyFileA
CloseHandle
HeapAlloc
RegCloseKey
RegCreateKeyExA
RegCreateKeyExW
RegDeleteKeyW
RegDeleteValueA
RegEnumKeyW
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
InitCommonControlsEx
ord17
ImageList_ReplaceIcon
ImageList_Create
ord6
GetSaveFileNameA
GetOpenFileNameA
CallWindowProcA
CheckDlgButton
CloseClipboard
CreateDialogIndirectParamA
CreateWindowExA
DefWindowProcA
DestroyIcon
DestroyMenu
DestroyWindow
DialogBoxParamA
DispatchMessageA
DrawIcon
DrawTextA
EmptyClipboard
EnableMenuItem
EnableWindow
EndDialog
EndPaint
FillRect
GetActiveWindow
GetAsyncKeyState
GetClassNameA
GetClientRect
GetCursorPos
GetDesktopWindow
GetDialogBaseUnits
GetDlgItem
GetDlgItemInt
GetKeyState
GetLastActivePopup
GetParent
GetSubMenu
GetSysColor
GetSystemMenu
GetSystemMetrics
BeginPaint
GetWindowDC
GetWindowLongA
GetWindowRect
GetWindowTextA
InvalidateRect
IsDialogMessageA
IsDlgButtonChecked
IsWindow
KillTimer
LoadIconA
LoadMenuA
LoadStringA
MessageBeep
MessageBoxA
MoveWindow
OpenClipboard
PeekMessageA
PostMessageA
PostQuitMessage
RedrawWindow
SendMessageA
SetClipboardData
SetDlgItemInt
SetDlgItemTextA
SetDlgItemTextW
SetFocus
SetForegroundWindow
SetRect
SetTimer
SetWindowLongA
SetWindowPos
SetWindowTextA
SystemParametersInfoA
TrackPopupMenu
TranslateMessage
WaitMessage
WinHelpA
GetWindow
ShellExecuteA
DragQueryFileA
DragFinish
BAOOpenFile
D3D9RegisterVertexBuffer
GetMCCustomSetNumberCount
GetPreviousDeviceInfo
SetupArgument
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ