ComputeTangent
CreateFontW
CreateVolumeTextureFromFileA
CreateVolumeTextureFromFileExA
MatrixRotationZ
QuaternionSquadSetup
SaveBitmapMemory
SaveSurfaceToFileA
Vec4Normalize
VecLoadFile
WriteFileStamp
Static task
static1
Behavioral task
behavioral1
Sample
b3a45c46a8ddc1ff32a312c4bb184f67_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b3a45c46a8ddc1ff32a312c4bb184f67_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
b3a45c46a8ddc1ff32a312c4bb184f67_JaffaCakes118
Size
110KB
MD5
b3a45c46a8ddc1ff32a312c4bb184f67
SHA1
a7cadb372f7b1d72493ce55dcd4d5f13ddffe533
SHA256
b34161c8f893ce8ce24aa03b6a55c22538bf7b5bf1f34ec3c5ce3456f2545ed7
SHA512
253073f93e28411820edf8e16af307255cdf1adbd7dbf5fa6a9bd66ac1bcf0f0170d58b8b8fdc17a1b71e759904b91d66a045331ecb341e943b2b0e4b50f3a77
SSDEEP
3072:x0Dh34urwjFjt5NJmn3Xq1uWuYYVU9Bz/nU97/24bNAPQCYCl8:xQl4urwjttjJmnKU3r6/U9LbH1C
Checks for missing Authenticode signature.
resource |
---|
b3a45c46a8ddc1ff32a312c4bb184f67_JaffaCakes118 |
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetUserNameW
RegCloseKey
RegCreateKeyExA
RegDeleteKeyA
RegEnumKeyExA
RegOpenKeyExA
RegQueryValueExA
RegQueryValueExW
RegSetValueExA
RegSetValueExW
SetWindowTextW
SetWindowTextA
SetWindowLongW
SetWindowLongA
SetTimer
SetMenuItemInfoW
SetMenu
SetDebugErrorLevel
SendMessageW
RemoveMenu
RegisterClipboardFormatA
RegisterClassA
PostQuitMessage
PostMessageA
OpenClipboard
NotifyWinEvent
ModifyMenuW
MessageBoxW
MapVirtualKeyA
MapDialogRect
LookupIconIdFromDirectory
LockSetForegroundWindow
LoadIconA
LoadCursorA
LoadBitmapA
LoadAcceleratorsW
LoadAcceleratorsA
KillTimer
IsZoomed
IsWindowEnabled
IsDlgButtonChecked
InvalidateRect
InsertMenuItemA
GetWindowTextW
GetWindowTextA
GetWindowPlacement
GetWindowLongA
GetUserObjectInformationA
GetTitleBarInfo
GetSubMenu
GetMessageW
GetMenuItemInfoW
GetMenuItemInfoA
GetMenuItemCount
GetMenuBarInfo
ShowScrollBar
GetKeyState
GetInputState
GetGUIThreadInfo
GetDlgItem
GetClientRect
GetClassInfoW
GetClassInfoA
GetCapture
FlashWindowEx
FindWindowA
ExcludeUpdateRgn
EndPaint
EnableWindow
EmptyClipboard
DrawStateW
DrawMenuBar
DispatchMessageW
DialogBoxParamW
DialogBoxParamA
DestroyWindow
DestroyMenu
DestroyIcon
DestroyAcceleratorTable
DefWindowProcW
DefWindowProcA
DdeGetLastError
DdeConnectList
CreateWindowExW
CreateWindowExA
CreateMenu
CreateIconIndirect
CreateAcceleratorTableA
ClientToScreen
ChildWindowFromPointEx
CheckRadioButton
CheckMenuRadioItem
CheckMenuItem
CheckDlgButton
CharUpperW
CharUpperA
CharPrevA
CharLowerW
CharLowerA
CallWindowProcW
CallWindowProcA
AppendMenuW
ShowWindow
SystemParametersInfoA
TileWindows
TrackPopupMenuEx
TranslateAcceleratorA
TranslateAcceleratorW
TranslateMDISysAccel
TranslateMessage
UnregisterHotKey
UpdateLayeredWindow
UpdateWindow
wsprintfA
GetMenu
lstrlenA
lstrcatA
WriteFile
WideCharToMultiByte
WaitForSingleObject
WaitForMultipleObjects
VirtualProtect
VirtualFree
VirtualAlloc
UnmapViewOfFile
SystemTimeToFileTime
Sleep
SetPriorityClass
SetLastError
SetFileTime
SetFilePointer
SetFileAttributesW
SetFileAttributesA
SetEvent
SetEndOfFile
RemoveDirectoryW
RemoveDirectoryA
ReadFile
MultiByteToWideChar
MoveFileW
MoveFileA
MapViewOfFile
LocalFree
LoadLibraryW
LoadLibraryExW
LoadLibraryExA
LoadLibraryA
LeaveCriticalSection
InterlockedIncrement
InterlockedDecrement
InitializeCriticalSection
HeapFree
HeapAlloc
GlobalUnlock
GlobalSize
GlobalLock
GlobalFree
GlobalAlloc
GetWindowsDirectoryW
GetWindowsDirectoryA
GetVolumeInformationW
GetVolumeInformationA
GetVersionExA
GetUserDefaultLangID
GetTickCount
GetTempPathW
GetTempPathA
GetTempFileNameW
GetTempFileNameA
GetSystemTime
GetSystemDefaultLangID
GetStdHandle
GetStartupInfoA
GetProcessHeap
GetProcAddress
GetModuleHandleW
GetModuleHandleA
GetModuleFileNameW
GetModuleFileNameA
GetLogicalDriveStringsW
GetLogicalDriveStringsA
GetLastError
GetFullPathNameW
GetFullPathNameA
GetFileSize
GetExitCodeThread
GetDriveTypeA
GetDiskFreeSpaceA
GetCurrentProcess
GetCurrentDirectoryW
GetCompressedFileSizeW
GetCommandLineW
FreeLibrary
FormatMessageW
FormatMessageA
FindNextFileW
FindNextFileA
FindNextChangeNotification
FindFirstFileW
FindFirstFileA
FindFirstChangeNotificationW
FindFirstChangeNotificationA
FindCloseChangeNotification
FindClose
FileTimeToSystemTime
FileTimeToLocalFileTime
FileTimeToDosDateTime
ExitThread
ExitProcess
EnterCriticalSection
DeviceIoControl
DeleteFileW
DeleteFileA
DeleteCriticalSection
CreateProcessW
CreateProcessA
CreateFileW
CreateFileMappingA
CreateFileA
CreateEventA
AreFileApisANSI
CloseHandle
CompareFileTime
CopyFileA
CopyFileW
CreateDirectoryA
CreateDirectoryW
ShellExecuteA
SHGetSpecialFolderLocation
SHGetPathFromIDListA
SHGetMalloc
SHGetFileInfoA
SHGetDesktopFolder
SHFileOperationA
SHChangeNotify
SHBrowseForFolderA
DragQueryFileW
DragQueryFileA
DragFinish
ShellExecuteExA
RevokeDragDrop
ReleaseStgMedium
RegisterDragDrop
OleUninitialize
OleInitialize
DoDragDrop
CoUninitialize
CoTaskMemFree
CoTaskMemAlloc
CoInitialize
_adjust_fdiv
wcsncmp
wcslen
strlen
srand
rand
memset
memmove
memcpy
memcmp
malloc
_CxxThrowException
_XcptFilter
__CxxFrameHandler
__dllonexit
__getmainargs
__p__commode
__p__fmode
__set_app_type
__setusermatherr
_acmdln
_beginthreadex
_controlfp
_except_handler3
_exit
_initterm
_onexit
_purecall
_wcsicmp
exit
free
ComputeTangent
CreateFontW
CreateVolumeTextureFromFileA
CreateVolumeTextureFromFileExA
MatrixRotationZ
QuaternionSquadSetup
SaveBitmapMemory
SaveSurfaceToFileA
Vec4Normalize
VecLoadFile
WriteFileStamp
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ