LpkDllInitialize
LpkDrawTextEx
LpkEditControl
LpkExtTextOut
LpkGetCharacterPlacement
LpkGetTextExtentExPoint
LpkInitialize
LpkPSMTextOut
LpkTabbedTextOut
LpkUseGDIWidthCache
ftsWordBreak
Static task
static1
Behavioral task
behavioral1
Sample
a455ac3a5db9c46a931947630029d287_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a455ac3a5db9c46a931947630029d287_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
a455ac3a5db9c46a931947630029d287_JaffaCakes118
Size
122KB
MD5
a455ac3a5db9c46a931947630029d287
SHA1
c0081d3632c4b49f689b3538acd5ed894182d9aa
SHA256
5389dbf026d2e3e5edc3f7611a5ee4f07a7c5c1c8f7020490bb793a6b0167cfd
SHA512
38ba9b1b38b56bb79ceac77701eed36e0b2a8b4bddbe11e92a3e83c8f23b857386f365d27d1c96cd6b67dda8ec4628c15cd18cd132bd0cb8017044972262ad91
SSDEEP
768:SojY9PkAum/U12tZAW/BXcTjX/O8KDbZSen6yHEojY9Po:7mCiI2tZ7XqYZzn6yH1mg
Checks for missing Authenticode signature.
resource |
---|
a455ac3a5db9c46a931947630029d287_JaffaCakes118 |
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
ExitProcess
GetProcAddress
RtlMoveMemory
LoadLibraryW
lstrcatW
GetSystemDirectoryW
FreeLibrary
lstrcpynA
LockResource
LoadResource
SizeofResource
FindResourceW
CreateProcessW
RtlZeroMemory
CloseHandle
WriteFile
CreateFileW
GetTempFileNameW
GetTempPathW
GetLastError
CreateMutexA
lstrcmpiW
GetModuleFileNameW
GetExitCodeProcess
TerminateProcess
WaitForSingleObject
GetCurrentThreadId
GetFileAttributesW
lstrcpyW
GetTickCount
GetLogicalDrives
FindNextFileW
SetFileAttributesW
CopyFileW
FindClose
FindFirstFileW
WaitForMultipleObjects
TerminateThread
ResumeThread
SetThreadPriority
CreateThread
SetEvent
CreateEventW
DisableThreadLibraryCalls
wsprintfW
ord64
ord92
SHRegGetValueW
PathFindExtensionW
PathFindFileNameW
PathAppendW
PathRemoveFileSpecW
StrStrIW
LpkDllInitialize
LpkDrawTextEx
LpkEditControl
LpkExtTextOut
LpkGetCharacterPlacement
LpkGetTextExtentExPoint
LpkInitialize
LpkPSMTextOut
LpkTabbedTextOut
LpkUseGDIWidthCache
ftsWordBreak
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ