LpkDllInitialize
LpkDrawTextEx
LpkEditControl
LpkExtTextOut
LpkGetCharacterPlacement
LpkGetTextExtentExPoint
LpkInitialize
LpkPSMTextOut
LpkTabbedTextOut
LpkUseGDIWidthCache
ftsWordBreak
Static task
static1
Behavioral task
behavioral1
Sample
b573ca7c97e5fe2641b016b559697f32_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b573ca7c97e5fe2641b016b559697f32_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
b573ca7c97e5fe2641b016b559697f32_JaffaCakes118
Size
47KB
MD5
b573ca7c97e5fe2641b016b559697f32
SHA1
b1c4973935017dafed4c869c1801666a37fa3342
SHA256
66b9fa7b8b8d51641cd81f1911a2f95c5ac1bb61e69a8caee64e878ef1a2aff2
SHA512
f121c57d2a937097ae7ee08451888a8787214ef6e3cc960c3c76ffdf83d73eb3ff6b70dcbd47b14a7d341c81b877f04be2422d8191d5342329b0411fbeae24f3
SSDEEP
768:lojY9PXAum/U12tZAW/BXcTjX/O8KDbZSRn6yHEojY9Po:wmXiI2tZ7XqYZcn6yH1mg
Checks for missing Authenticode signature.
resource |
---|
b573ca7c97e5fe2641b016b559697f32_JaffaCakes118 |
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
ExitProcess
GetProcAddress
RtlMoveMemory
LoadLibraryW
lstrcatW
GetSystemDirectoryW
FreeLibrary
lstrcpynA
LockResource
LoadResource
SizeofResource
FindResourceW
CreateProcessW
RtlZeroMemory
CloseHandle
WriteFile
CreateFileW
GetTempFileNameW
GetTempPathW
GetLastError
CreateMutexA
lstrcmpiW
GetModuleFileNameW
GetExitCodeProcess
TerminateProcess
WaitForSingleObject
GetCurrentThreadId
GetFileAttributesW
lstrcpyW
GetTickCount
GetLogicalDrives
FindNextFileW
SetFileAttributesW
CopyFileW
FindClose
FindFirstFileW
WaitForMultipleObjects
TerminateThread
ResumeThread
SetThreadPriority
CreateThread
SetEvent
CreateEventW
DisableThreadLibraryCalls
wsprintfW
ord64
ord92
SHRegGetValueW
PathFindExtensionW
PathFindFileNameW
PathAppendW
PathRemoveFileSpecW
StrStrIW
LpkDllInitialize
LpkDrawTextEx
LpkEditControl
LpkExtTextOut
LpkGetCharacterPlacement
LpkGetTextExtentExPoint
LpkInitialize
LpkPSMTextOut
LpkTabbedTextOut
LpkUseGDIWidthCache
ftsWordBreak
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ