EnumAvValueRelease
EnumFileInItemRelease
EstimateTrackSize
GLUnmapBufferObjectAsync
GetFunctions_i
Memcpy2DToArray
MutexOperation
TextureFetch
Static task
static1
Behavioral task
behavioral1
Sample
8bd11b674e6613baa351ebfd0420a191_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
8bd11b674e6613baa351ebfd0420a191_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
8bd11b674e6613baa351ebfd0420a191_JaffaCakes118
Size
268KB
MD5
8bd11b674e6613baa351ebfd0420a191
SHA1
c4cb46ddb3c7da234184a92d399e111407cdacc8
SHA256
15e01a0e021db3dd3f378a25c15e1bbf11ec9fd8842000ff5ed27dd6094b722b
SHA512
758c855a7b30ca7192710543c85e94c11c3dc7d752af2e7453329811b4bfd993925b1a178ceff68311f9cea08359bb17c8c3dc1c8002a268eaa28245b26db9a5
SSDEEP
6144:vVlM0DcuFaFS+imL8/XDkoIMOxcM4mV2s7JETEXWqRZ2wPbYwd:rZFulLSXDkoIMGcxmVD7JEIXF/2wTb
Checks for missing Authenticode signature.
resource |
---|
8bd11b674e6613baa351ebfd0420a191_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
BringWindowToTop
BeginPaint
AppendMenuW
CallNextHookEx
CallWindowProcA
CharNextA
ClientToScreen
CloseClipboard
CopyRect
CreateCaret
CreatePopupMenu
CreateWindowExA
DefWindowProcA
DestroyCaret
DestroyMenu
DestroyWindow
DialogBoxParamA
DispatchMessageA
EmptyClipboard
EnableWindow
EndDialog
EndPaint
EnumChildWindows
FillRect
GetActiveWindow
GetCapture
GetClassInfoExA
GetClientRect
GetClipboardData
GetCursor
GetCursorPos
GetDC
GetDesktopWindow
GetFocus
GetKeyState
GetParent
GetScrollInfo
GetSystemMetrics
GetWindowLongA
GetWindowRect
IntersectRect
InvalidateRect
InvalidateRgn
IsClipboardFormatAvailable
IsRectEmpty
IsWindow
IsWindowEnabled
IsWindowVisible
KillTimer
LoadCursorA
MapWindowPoints
MessageBoxA
MoveWindow
OpenClipboard
PeekMessageA
PostMessageA
PostThreadMessageA
PtInRect
RegisterClassExA
ReleaseCapture
ReleaseDC
ScreenToClient
SendMessageA
SetCapture
SetClipboardData
SetCursor
SetCursorPos
SetDlgItemInt
SetDlgItemTextA
SetFocus
SetRect
SetRectEmpty
SetScrollInfo
SetTimer
SetWindowLongA
SetWindowPos
SetWindowTextA
SetWindowsHookExA
ShowWindow
TrackPopupMenuEx
TranslateMessage
UnhookWindowsHookEx
UnregisterClassA
wsprintfA
wvsprintfA
AppendMenuA
TextOutA
StretchDIBits
StretchBlt
SetWindowOrgEx
SetWindowExtEx
SetWinMetaFileBits
SetViewportOrgEx
SetViewportExtEx
SetTextColor
SetStretchBltMode
SetROP2
SetMetaFileBitsEx
SetMapMode
SetEnhMetaFileBits
SetDIBitsToDevice
SetBkMode
SetBkColor
SelectPalette
SelectObject
SelectClipRgn
RoundRect
Rectangle
RealizePalette
PtInRegion
Polygon
PolyBezier
PlayMetaFile
PlayEnhMetaFile
Pie
MoveToEx
LineTo
GetSystemPaletteEntries
GetStockObject
GetRgnBox
GetPixel
GetPaletteEntries
GetObjectType
GetObjectA
GetMapMode
GetEnhMetaFileHeader
GetEnhMetaFileBits
GetDeviceCaps
GetDIBits
GetClipRgn
FrameRgn
FillRgn
Escape
Ellipse
DeleteObject
DeleteMetaFile
DeleteEnhMetaFile
DeleteDC
DPtoLP
CreateSolidBrush
CreateRectRgnIndirect
CreateRectRgn
CreatePolygonRgn
CreatePen
CreatePatternBrush
CreatePalette
CreateHatchBrush
CreateEllipticRgn
CreateDIBitmap
CreateDIBSection
CreateCompatibleDC
CreateCompatibleBitmap
CreateBrushIndirect
CreateBitmap
CombineRgn
BitBlt
Arc
RegQueryInfoKeyA
RegCreateKeyExA
RegDeleteKeyA
RegDeleteValueA
RegSetValueExA
RegQueryValueA
RegCloseKey
RegOpenKeyExA
RegOpenKeyA
RegEnumKeyExA
CoTaskMemFree
CoTaskMemAlloc
CoCreateInstance
CoTaskMemRealloc
GetCPInfo
lstrcpynA
lstrcpyA
lstrcmpiA
lstrcmpA
WriteFile
WideCharToMultiByte
WaitForMultipleObjects
VirtualQuery
VirtualProtect
VirtualFree
VirtualAlloc
UnmapViewOfFile
UnhandledExceptionFilter
TlsSetValue
TlsGetValue
TlsFree
TlsAlloc
TerminateProcess
Sleep
SizeofResource
SetUnhandledExceptionFilter
SetThreadPriority
SetStdHandle
SetLastError
SetHandleCount
SetFilePointer
SetEvent
SetEndOfFile
RtlUnwind
ResumeThread
ResetEvent
ReleaseMutex
ReadFile
RaiseException
QueryPerformanceCounter
MultiByteToWideChar
MapViewOfFile
LockResource
LocalUnlock
LocalLock
LocalFree
LocalAlloc
LoadResource
LoadLibraryExA
LoadLibraryA
LeaveCriticalSection
LCMapStringW
LCMapStringA
IsDBCSLeadByte
IsBadWritePtr
IsBadReadPtr
IsBadCodePtr
InterlockedIncrement
InterlockedExchange
InterlockedDecrement
InitializeCriticalSection
HeapSize
HeapReAlloc
HeapFree
HeapDestroy
HeapCreate
HeapAlloc
GlobalUnlock
GlobalSize
GlobalReAlloc
GlobalLock
GlobalHandle
GlobalFree
GlobalAlloc
GetWindowsDirectoryA
GetVersionExA
GetVersion
GetTimeFormatA
GetTickCount
GetThreadLocale
GetTempPathA
GetTempFileNameA
GetSystemTimeAsFileTime
GetSystemInfo
GetSystemDirectoryA
GetStringTypeW
GetStringTypeA
GetStdHandle
GetStartupInfoA
GetProcessHeap
lstrlenW
CloseHandle
CreateEventA
CreateFileA
CreateFileMappingA
CreateMutexA
CreateThread
DeleteCriticalSection
DeleteFileA
DuplicateHandle
EnterCriticalSection
ExitProcess
FileTimeToSystemTime
FindFirstFileA
FindResourceA
FindResourceExA
FlushFileBuffers
FlushInstructionCache
FreeEnvironmentStringsA
FreeEnvironmentStringsW
FreeLibrary
FreeResource
GetACP
GetProcAddress
GetCommandLineA
GetCurrentProcess
GetCurrentProcessId
GetCurrentThread
GetCurrentThreadId
GetDateFormatA
GetEnvironmentStringsA
GetEnvironmentStringsW
GetEnvironmentVariableA
GetFileSize
GetFileType
GetLastError
GetLocaleInfoA
GetModuleFileNameA
GetModuleHandleA
GetOEMCP
lstrlenA
DestroyPropertySheetPage
PropertySheetA
CreatePropertySheetPageA
EnumAvValueRelease
EnumFileInItemRelease
EstimateTrackSize
GLUnmapBufferObjectAsync
GetFunctions_i
Memcpy2DToArray
MutexOperation
TextureFetch
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ