AddDataToImageItem
BindTexture2D
CopyClickWBCoefs
CreateFolder
EnumDeviceReset
EnumRelCamSettingReset
GetAFDistanceSettingCount
GetDevice
GetDiscErasingTime
GetExposureComp
MallocPitch
RegisterFatBinary
UnbindTexture
WGLGetDevice
Static task
static1
Behavioral task
behavioral1
Sample
4dd7f07aa82f915a8f690035680e0860_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
4dd7f07aa82f915a8f690035680e0860_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
4dd7f07aa82f915a8f690035680e0860_JaffaCakes118
Size
260KB
MD5
4dd7f07aa82f915a8f690035680e0860
SHA1
be84a7b080ff5baa8a319049808f51cdc548f936
SHA256
1d519e7a2a985911bab3fac8541f5b51357ca978e385497c49194e3414106bae
SHA512
32e4a2eb5ca79e5d675259cb75be1e4a03554348c906d830a4329ba2a0ccc0fb5abc0c8d1036f91f549e7db30d86230ec1700d7dbbf19621b2c979d2783e4855
SSDEEP
6144:sjFzn+ko1gTQm+tja87ZPSiMAKSh5w2bzCOGERbDAimxz1i3uBbSjMLX:s4J97ZOWBbFAzrZ
Checks for missing Authenticode signature.
resource |
---|
4dd7f07aa82f915a8f690035680e0860_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
RegCloseKey
RegCreateKeyExA
RegDeleteKeyA
RegDeleteValueA
RegEnumKeyExA
RegOpenKeyA
RegOpenKeyExA
RegQueryInfoKeyA
RegQueryValueA
RegSetValueExA
CoTaskMemRealloc
CoTaskMemFree
CoTaskMemAlloc
CoCreateInstance
LCMapStringA
CloseHandle
CreateEventA
CreateFileA
CreateFileMappingA
CreateMutexA
CreateThread
DeleteCriticalSection
DeleteFileA
DuplicateHandle
EnterCriticalSection
ExitProcess
FileTimeToSystemTime
FindFirstFileA
FindResourceA
FindResourceExA
FlushFileBuffers
FlushInstructionCache
FreeEnvironmentStringsA
FreeEnvironmentStringsW
FreeLibrary
FreeResource
GetACP
GetCPInfo
GetCommandLineA
GetCurrentProcess
GetCurrentProcessId
GetCurrentThread
GetCurrentThreadId
GetDateFormatA
GetEnvironmentStringsA
GetEnvironmentStringsW
GetEnvironmentVariableA
GetFileSize
GetFileType
GetLastError
GetLocaleInfoA
GetModuleFileNameA
GetModuleHandleA
GetOEMCP
GetProcAddress
GetProcessHeap
GetStartupInfoA
GetStdHandle
GetStringTypeA
GetStringTypeW
GetSystemDirectoryA
GetSystemInfo
GetSystemTimeAsFileTime
GetTempFileNameA
GetTempPathA
GetThreadLocale
GetTickCount
GetTimeFormatA
GetVersion
GetVersionExA
GetWindowsDirectoryA
GlobalAlloc
GlobalFree
GlobalHandle
GlobalLock
GlobalReAlloc
GlobalSize
GlobalUnlock
HeapAlloc
HeapCreate
HeapDestroy
HeapFree
HeapReAlloc
HeapSize
InitializeCriticalSection
InterlockedExchange
InterlockedIncrement
IsBadCodePtr
IsBadReadPtr
IsBadWritePtr
IsDBCSLeadByte
InterlockedDecrement
LCMapStringW
LeaveCriticalSection
LoadLibraryA
LoadLibraryExA
LoadResource
LocalAlloc
LocalFree
LocalLock
LocalUnlock
LockResource
MapViewOfFile
MultiByteToWideChar
QueryPerformanceCounter
RaiseException
ReadFile
ReleaseMutex
ResetEvent
ResumeThread
RtlUnwind
SetEndOfFile
SetEvent
SetFilePointer
SetHandleCount
SetLastError
SetStdHandle
SetThreadPriority
SetUnhandledExceptionFilter
SizeofResource
Sleep
TerminateProcess
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
UnmapViewOfFile
VirtualAlloc
VirtualFree
VirtualProtect
VirtualQuery
WaitForMultipleObjects
WideCharToMultiByte
WriteFile
lstrcmpA
lstrcmpiA
lstrcpyA
lstrcpynA
lstrlenW
SysAllocStringLen
OleIconToCursor
OleTranslateColor
SafeArrayAccessData
SafeArrayCreateVector
SafeArrayGetElement
SafeArrayGetElemsize
SafeArrayGetLBound
SafeArrayGetUBound
SafeArrayLock
SafeArrayPutElement
SafeArrayUnaccessData
SafeArrayUnlock
SysAllocString
SysAllocStringByteLen
VariantInit
SysFreeString
SysReAllocString
SysStringByteLen
SysStringLen
VarUI4FromStr
VariantClear
VariantCopy
VariantCopyInd
PropertySheetA
DestroyPropertySheetPage
CreatePropertySheetPageA
AddDataToImageItem
BindTexture2D
CopyClickWBCoefs
CreateFolder
EnumDeviceReset
EnumRelCamSettingReset
GetAFDistanceSettingCount
GetDevice
GetDiscErasingTime
GetExposureComp
MallocPitch
RegisterFatBinary
UnbindTexture
WGLGetDevice
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ