CreateNPatchMesh
CreateVolumeTextureFromFileA
FileInfo
GeneratePMesh
LoadSurfaceFromSurface
ReadFileExtensions
SHDot
SHRotateZ
SaveMeshHierarchyToFileW
SaveSurfaceToFileInMemory
StartDecompressBuffer
Vec4Transform
VecStopFeedLoad
mpegSplitSeekTime
Static task
static1
Behavioral task
behavioral1
Sample
23e6a286815795b891cb1bf5514f3603_JaffaCakes118.dll
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
23e6a286815795b891cb1bf5514f3603_JaffaCakes118.dll
Resource
win10v2004-20240611-en
Target
23e6a286815795b891cb1bf5514f3603_JaffaCakes118
Size
273KB
MD5
23e6a286815795b891cb1bf5514f3603
SHA1
14d086ee12d3baab3d1c45827d3d1d69416a4746
SHA256
b80bc9820865464a211183a67d5aef80d5cb3dddbdc10a6a14ee7f9deea17346
SHA512
588787b27c94f55a13e2e6b5fc88ea838681d09b5c79b73bfa31b8c0fc51831423f603cf21cbf0a6f1c519cbb1c8c057677c30c81f6da131c53d065827c03af9
SSDEEP
6144:3HIVa2keFNxsmpMzIHcdiXkEphCDR7N+ySozLl8RetTKFgTQTnc:3o3NfMEyhDiySkUeoFgTQI
Checks for missing Authenticode signature.
resource |
---|
23e6a286815795b891cb1bf5514f3603_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
LoadRegTypeLi
LoadTypeLi
OleCreateFontIndirect
SysAllocStringLen
SysFreeString
SysStringByteLen
SysStringLen
VarCyInt
VarDecFromR4
VarUI4FromStr
VariantClear
VariantInit
IsChild
InvalidateRgn
InvalidateRect
GetWindowWord
GetWindowTextLengthA
GetWindowTextA
GetWindowRect
GetWindowLongA
GetWindow
GetSysColor
GetDlgItem
GetDlgCtrlID
GetDesktopWindow
GetDC
GetCursorPos
GetClientRect
IsWindow
LoadCursorA
LoadStringA
MessageBoxA
PtInRect
RegisterClassExA
RegisterWindowMessageA
ReleaseCapture
ReleaseDC
GetClassNameA
GetClassInfoExA
GetCapture
GetActiveWindow
EndPaint
EndDialog
DialogBoxIndirectParamA
DestroyWindow
DestroyAcceleratorTable
DefWindowProcA
CreateWindowExA
CreateAcceleratorTableA
ClipCursor
CharNextA
CallWindowProcA
BeginPaint
SendMessageA
SetCursor
SetWindowContextHelpId
SetWindowLongA
SetWindowPlacement
SetWindowPos
SetWindowTextA
SwitchToThisWindow
ToAscii
UnhookWindowsHookEx
keybd_event
wsprintfA
DirectDrawCreateClipper
ord17
lstrcmpiA
lstrcmpA
lstrcpynA
VirtualProtect
VirtualFree
VirtualAlloc
SizeofResource
SetLastError
lstrlenA
QueryPerformanceCounter
MultiByteToWideChar
MulDiv
LockResource
LoadResource
LoadLibraryExA
LoadLibraryA
LeaveCriticalSection
IsProcessorFeaturePresent
IsDBCSLeadByte
InterlockedIncrement
InterlockedExchange
InterlockedDecrement
InterlockedCompareExchange
InitializeCriticalSection
HeapFree
HeapAlloc
GlobalUnlock
GlobalLock
GlobalHandle
GlobalFree
GlobalAlloc
GetVersionExA
GetTickCount
GetThreadLocale
lstrlenW
RaiseException
WideCharToMultiByte
DeleteCriticalSection
DisableThreadLibraryCalls
EnterCriticalSection
ExitProcess
FindResourceA
FlushInstructionCache
FreeLibrary
GetACP
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetLastError
GetLocaleInfoA
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GetProcessHeap
GetProcessPriorityBoost
GetSystemTimeAsFileTime
WOWShellExecute
SHLoadNonloadedIconOverlayIdentifiers
SHGetSpecialFolderLocation
SHFreeNameMappings
SHExtractIconsW
SHCreateProcessAsUserW
SHBindToParent
DragAcceptFiles
SetBkMode
SelectObject
SaveDC
RestoreDC
GetStockObject
GetObjectA
GetDeviceCaps
SetMetaFileBitsEx
DeleteObject
DeleteDC
DPtoLP
CreateSolidBrush
CreatePenIndirect
CreateCompatibleBitmap
BitBlt
ExtFloodFill
SetTextColor
SetWindowOrgEx
RegSetValueExA
RegQueryValueExA
RegQueryInfoKeyA
RegOpenKeyExA
RegEnumKeyExA
RegDeleteValueA
RegDeleteKeyA
RegCreateKeyExA
RegCloseKey
CreateNPatchMesh
CreateVolumeTextureFromFileA
FileInfo
GeneratePMesh
LoadSurfaceFromSurface
ReadFileExtensions
SHDot
SHRotateZ
SaveMeshHierarchyToFileW
SaveSurfaceToFileInMemory
StartDecompressBuffer
Vec4Transform
VecStopFeedLoad
mpegSplitSeekTime
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ