AlphaBlend
DllInitialize
GradientFill
TransparentBlt
vSetDdrawflag
Static task
static1
Behavioral task
behavioral1
Sample
64313b36ce8c4709f62c7ce3a4fdccf1_JaffaCakes118.dll
Resource
win7-20240708-en
Target
64313b36ce8c4709f62c7ce3a4fdccf1_JaffaCakes118
Size
164KB
MD5
64313b36ce8c4709f62c7ce3a4fdccf1
SHA1
116a6e2c73f331695b17e1e907b621001e729964
SHA256
53a4bef48149155e7d8d4bf4eb06a9a25c09d83b45dc2451dd21887794ddcdfb
SHA512
51420986c7d7f33f94773770b9589471e80af8a24c190cf6ea90931504fa8d6b29289059bea330bf23112d18b5945b4a1ccea3da5c52a24e4af364f40d12072c
SSDEEP
3072:MdAeyq2UsqGiZVGsYFM7FZJa4+bO3xJflldXDmqKcd5CsCpE8B:Mhb5RBJapOBJtrXKcqsCpE8B
Checks for missing Authenticode signature.
resource |
---|
64313b36ce8c4709f62c7ce3a4fdccf1_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetProcAddress
LoadLibraryA
GetModuleHandleA
OutputDebugStringA
GetSystemDirectoryA
GetCommandLineA
GetVersion
HeapAlloc
EnterCriticalSection
LeaveCriticalSection
ExitProcess
TerminateProcess
GetCurrentProcess
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
GetLastError
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
HeapFree
WriteFile
VirtualAlloc
HeapReAlloc
InitializeCriticalSection
RtlUnwind
InterlockedDecrement
InterlockedIncrement
GetCPInfo
GetACP
GetOEMCP
FlushFileBuffers
SetFilePointer
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
CloseHandle
SetStdHandle
AlphaBlend
DllInitialize
GradientFill
TransparentBlt
vSetDdrawflag
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ