ComputeTangent
CreateFontW
CreateVolumeTextureFromFileA
CreateVolumeTextureFromFileExA
MatrixRotationZ
QuaternionSquadSetup
SaveBitmapMemory
SaveSurfaceToFileA
Vec4Normalize
VecLoadFile
WriteFileStamp
Static task
static1
Behavioral task
behavioral1
Sample
73753f1e0539374ad4076cf3841bc8d2_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
73753f1e0539374ad4076cf3841bc8d2_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
73753f1e0539374ad4076cf3841bc8d2_JaffaCakes118
Size
107KB
MD5
73753f1e0539374ad4076cf3841bc8d2
SHA1
5b6ae86f76765ad9992487a657f74fa30af47f68
SHA256
938952a06fab766181ec39b8cafa2c2a3d65f9eccbf4f9ad7b8119abcec512af
SHA512
55e224a27c5a3b4893f67f28c2c26ff694621e5819c9e39a19a4aa73672ef56377b87bda3900dd6a05d6bbf14b3e71eb9e8173b01af458e2ad13951963bf1914
SSDEEP
3072:vc2sqrQx0/vXXaAhGgfSURvj2YQX97mDt:jrA0/vXXEtS2YQX9S
Checks for missing Authenticode signature.
resource |
---|
73753f1e0539374ad4076cf3841bc8d2_JaffaCakes118 |
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetUserNameW
RegCloseKey
RegCreateKeyExA
RegDeleteKeyA
RegEnumKeyExA
RegOpenKeyExA
RegQueryValueExA
RegQueryValueExW
RegSetValueExA
RegSetValueExW
SetWindowTextW
SetWindowTextA
SetWindowLongW
SetWindowLongA
SetTimer
SetMenuItemInfoW
SetMenu
SetDebugErrorLevel
SendMessageW
RemoveMenu
RegisterClipboardFormatA
RegisterClassA
PostQuitMessage
PostMessageA
OpenClipboard
NotifyWinEvent
ModifyMenuW
MessageBoxW
MapVirtualKeyA
MapDialogRect
LookupIconIdFromDirectory
LockSetForegroundWindow
LoadIconA
LoadCursorA
LoadBitmapA
LoadAcceleratorsW
LoadAcceleratorsA
KillTimer
IsZoomed
IsWindowEnabled
IsDlgButtonChecked
InvalidateRect
InsertMenuItemA
GetWindowTextW
GetWindowTextA
GetWindowPlacement
GetWindowLongA
GetUserObjectInformationA
GetTitleBarInfo
GetSubMenu
GetMessageW
GetMenuItemInfoW
GetMenuItemInfoA
GetMenuItemCount
GetMenuBarInfo
ShowScrollBar
GetKeyState
GetInputState
GetGUIThreadInfo
GetDlgItem
GetClientRect
GetClassInfoW
GetClassInfoA
GetCapture
FlashWindowEx
FindWindowA
ExcludeUpdateRgn
EndPaint
EnableWindow
EmptyClipboard
DrawStateW
DrawMenuBar
DispatchMessageW
DialogBoxParamW
DialogBoxParamA
DestroyWindow
DestroyMenu
DestroyIcon
DestroyAcceleratorTable
DefWindowProcW
DefWindowProcA
DdeGetLastError
DdeConnectList
CreateWindowExW
CreateWindowExA
CreateMenu
CreateIconIndirect
CreateAcceleratorTableA
ClientToScreen
ChildWindowFromPointEx
CheckRadioButton
CheckMenuRadioItem
CheckMenuItem
CheckDlgButton
CharUpperW
CharUpperA
CharPrevA
CharLowerW
CharLowerA
CallWindowProcW
CallWindowProcA
AppendMenuW
ShowWindow
SystemParametersInfoA
TileWindows
TrackPopupMenuEx
TranslateAcceleratorA
TranslateAcceleratorW
TranslateMDISysAccel
TranslateMessage
UnregisterHotKey
UpdateLayeredWindow
UpdateWindow
wsprintfA
GetMenu
lstrlenA
lstrcatA
WriteFile
WideCharToMultiByte
WaitForSingleObject
WaitForMultipleObjects
VirtualProtect
VirtualFree
VirtualAlloc
UnmapViewOfFile
SystemTimeToFileTime
Sleep
SetPriorityClass
SetLastError
SetFileTime
SetFilePointer
SetFileAttributesW
SetFileAttributesA
SetEvent
SetEndOfFile
RemoveDirectoryW
RemoveDirectoryA
ReadFile
MultiByteToWideChar
MoveFileW
MoveFileA
MapViewOfFile
LocalFree
LoadLibraryW
LoadLibraryExW
LoadLibraryExA
LoadLibraryA
LeaveCriticalSection
InterlockedIncrement
InterlockedDecrement
InitializeCriticalSection
HeapFree
HeapAlloc
GlobalUnlock
GlobalSize
GlobalLock
GlobalFree
GlobalAlloc
GetWindowsDirectoryW
GetWindowsDirectoryA
GetVolumeInformationW
GetVolumeInformationA
GetVersionExA
GetUserDefaultLangID
GetTickCount
GetTempPathW
GetTempPathA
GetTempFileNameW
GetTempFileNameA
GetSystemTime
GetSystemDefaultLangID
GetStdHandle
GetStartupInfoA
GetProcessHeap
GetProcAddress
GetModuleHandleW
GetModuleHandleA
GetModuleFileNameW
GetModuleFileNameA
GetLogicalDriveStringsW
GetLogicalDriveStringsA
GetLastError
GetFullPathNameW
GetFullPathNameA
GetFileSize
GetExitCodeThread
GetDriveTypeA
GetDiskFreeSpaceA
GetCurrentProcess
GetCurrentDirectoryW
GetCompressedFileSizeW
GetCommandLineW
FreeLibrary
FormatMessageW
FormatMessageA
FindNextFileW
FindNextFileA
FindNextChangeNotification
FindFirstFileW
FindFirstFileA
FindFirstChangeNotificationW
FindFirstChangeNotificationA
FindCloseChangeNotification
FindClose
FileTimeToSystemTime
FileTimeToLocalFileTime
FileTimeToDosDateTime
ExitThread
ExitProcess
EnterCriticalSection
DeviceIoControl
DeleteFileW
DeleteFileA
DeleteCriticalSection
CreateProcessW
CreateProcessA
CreateFileW
CreateFileMappingA
CreateFileA
CreateEventA
AreFileApisANSI
CloseHandle
CompareFileTime
CopyFileA
CopyFileW
CreateDirectoryA
CreateDirectoryW
ShellExecuteA
SHGetSpecialFolderLocation
SHGetPathFromIDListA
SHGetMalloc
SHGetFileInfoA
SHGetDesktopFolder
SHFileOperationA
SHChangeNotify
SHBrowseForFolderA
DragQueryFileW
DragQueryFileA
DragFinish
ShellExecuteExA
RevokeDragDrop
ReleaseStgMedium
RegisterDragDrop
OleUninitialize
OleInitialize
DoDragDrop
CoUninitialize
CoTaskMemFree
CoTaskMemAlloc
CoInitialize
_adjust_fdiv
wcsncmp
wcslen
strlen
srand
rand
memset
memmove
memcpy
memcmp
malloc
_CxxThrowException
_XcptFilter
__CxxFrameHandler
__dllonexit
__getmainargs
__p__commode
__p__fmode
__set_app_type
__setusermatherr
_acmdln
_beginthreadex
_controlfp
_except_handler3
_exit
_initterm
_onexit
_purecall
_wcsicmp
exit
free
ComputeTangent
CreateFontW
CreateVolumeTextureFromFileA
CreateVolumeTextureFromFileExA
MatrixRotationZ
QuaternionSquadSetup
SaveBitmapMemory
SaveSurfaceToFileA
Vec4Normalize
VecLoadFile
WriteFileStamp
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ