CreateMarkers
CreatePolygon
MatrixRotationZ
mpegInSeekSample
Static task
static1
Behavioral task
behavioral1
Sample
a970f58c1e601058f4c15da20c7481ca_JaffaCakes118.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
a970f58c1e601058f4c15da20c7481ca_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
a970f58c1e601058f4c15da20c7481ca_JaffaCakes118
Size
308KB
MD5
a970f58c1e601058f4c15da20c7481ca
SHA1
5a08b0723d1274f0fd1a53fc210c9f5946ae16a6
SHA256
16539c1c16b979cb4019102ed5bccd7627d007c669ea51f2ff1edb38b0795a7b
SHA512
1978a4defa14c579d57794b19011f78eecff1a5a7609ac8f237c04f13ba1a4399179c57d48c67de7cca7755af679ff8b93aa51ff78333e2faf8282906c000660
SSDEEP
6144:iV/wN0luKalX6ik2TmrxNc6CRZUtfHrn4jk/qqLCzvXsZED/XYRL7TC:A/Z7dJLJCR8nYYCzvvroRfT
Checks for missing Authenticode signature.
resource |
---|
a970f58c1e601058f4c15da20c7481ca_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
SetSystemCursor
SetFocus
SetCursor
SetCapture
SendMessageA
ReleaseDC
ReleaseCapture
RegisterWindowMessageA
RegisterClassExA
RedrawWindow
PtInRect
OpenIcon
MessageBoxA
MapDialogRect
LoadStringA
IsChild
InvalidateRgn
GetWindowTextLengthA
GetWindowTextA
SetWindowContextHelpId
GetWindowLongA
GetWindow
GetUserObjectSecurity
GetSysColor
GetParent
GetDlgItem
GetDlgCtrlID
GetDesktopWindow
GetDC
GetCursorPos
GetClientRect
GetClassNameA
GetClassInfoExA
GetActiveWindow
FillRect
EndPaint
EnableWindow
EnableScrollBar
DrawFocusRect
SetWindowLongA
SetWindowPos
SetWindowTextA
UnregisterClassA
wsprintfA
GetWindowRect
DestroyWindow
DestroyAcceleratorTable
DefWindowProcA
DdeKeepStringHandle
CreateWindowExA
CreateIconFromResource
CreateAcceleratorTableA
CharNextA
CallWindowProcA
BeginPaint
ord17
SetTextColor
SetGraphicsMode
SetBkMode
SelectObject
SaveDC
PolylineTo
ModifyWorldTransform
GetStockObject
GetObjectA
GetDeviceCaps
DeleteObject
DPtoLP
CreateSolidBrush
CreateFontIndirectA
BitBlt
SetWindowOrgEx
DirectDrawCreateClipper
DirectDrawCreateEx
GetDDSurfaceLocal
GetSurfaceFromDC
VectorFromBstr
VariantInit
VarUI4FromStr
VarDateFromR4
SysStringLen
SysStringByteLen
SysAllocStringLen
SysAllocString
OleCreateFontIndirect
LoadRegTypeLi
InterlockedExchange
InterlockedDecrement
InterlockedCompareExchange
InitializeCriticalSection
HeapFree
HeapAlloc
WideCharToMultiByte
GlobalLock
GlobalHandle
GlobalFree
GlobalAlloc
InterlockedIncrement
GetTickCount
GetThreadLocale
GetSystemTimeAsFileTime
GetProcessPriorityBoost
GetProcessHeap
GetProcAddress
GetModuleHandleA
GetModuleFileNameA
GetLocaleInfoA
GetLastError
lstrcmpA
lstrcmpiA
IsDBCSLeadByte
IsProcessorFeaturePresent
LeaveCriticalSection
LoadLibraryA
LoadLibraryExA
LoadResource
LockResource
MulDiv
MultiByteToWideChar
QueryPerformanceCounter
RaiseException
SetLastError
SizeofResource
VirtualAlloc
VirtualFree
GetVersionExA
VirtualProtect
lstrcpynA
lstrlenA
lstrlenW
GlobalUnlock
GetCurrentProcessId
GetCurrentProcess
GetACP
FreeLibrary
FlushInstructionCache
FindResourceA
ExitProcess
EnterCriticalSection
DisableThreadLibraryCalls
DeleteCriticalSection
GetCurrentThreadId
SHGetSpecialFolderLocation
SHGetMalloc
SHFreeNameMappings
SHExtractIconsW
DragAcceptFiles
SHLoadNonloadedIconOverlayIdentifiers
RegSetValueExA
RegQueryValueExA
RegQueryInfoKeyA
RegOpenKeyExA
RegEnumKeyExA
RegDeleteValueA
RegDeleteKeyA
RegCreateKeyExA
RegCloseKey
CreateMarkers
CreatePolygon
MatrixRotationZ
mpegInSeekSample
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ