ConvertToDCFeX3
CreateFileSystemContainer
CreateIsoTrack
EnumVolumeRelease
MallocArray
MemcpyArrayToArray
RegisterFunction
Static task
static1
Behavioral task
behavioral1
Sample
b76d5935870367d29ebf08472e1d5d42_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
b76d5935870367d29ebf08472e1d5d42_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
b76d5935870367d29ebf08472e1d5d42_JaffaCakes118
Size
352KB
MD5
b76d5935870367d29ebf08472e1d5d42
SHA1
bd806eec35ff3edaa668a7866e99bb7078a1f4aa
SHA256
03a7d429738cc353836401023ed5769f8ff24e1a5a4c52086205dc029b1baf46
SHA512
def0b7a4bffb63bb80c83580579a92a2e5f4e043ee8ac0a333371c490198b4e8cc58a688fcb907c34a952213f04b4faf5ba67f5bbeab58c78fa369f2bdea71df
SSDEEP
6144:djWxmQrmdi/HvZst8Xl5HSy44spXX8ug+MRKiBWVmCiNhMsmIdr+3VLnzwA+:t+mGXUySoZ+l8
Checks for missing Authenticode signature.
resource |
---|
b76d5935870367d29ebf08472e1d5d42_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
RtlUnwind
GetCommandLineA
HeapAlloc
HeapFree
RaiseException
GetTimeZoneInformation
ExitProcess
TerminateProcess
SetStdHandle
GetFileType
HeapSize
HeapReAlloc
GetACP
SetHandleCount
GetStdHandle
GetStartupInfoA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
SetUnhandledExceptionFilter
IsBadReadPtr
IsBadCodePtr
CompareStringA
CompareStringW
SetEnvironmentVariableA
GetFileTime
GetFileSize
GetFullPathNameA
GetVolumeInformationA
FindFirstFileA
FindClose
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
ReadFile
GetCurrentProcess
DuplicateHandle
WritePrivateProfileStringA
GetOEMCP
GetCPInfo
GetProcessVersion
GlobalFlags
MulDiv
SetErrorMode
TlsGetValue
LocalReAlloc
TlsSetValue
EnterCriticalSection
GlobalReAlloc
LeaveCriticalSection
TlsFree
GlobalHandle
DeleteCriticalSection
TlsAlloc
InitializeCriticalSection
LocalAlloc
GlobalFree
GetModuleFileNameA
lstrcmpA
GetCurrentThread
GlobalAlloc
GetThreadLocale
LoadLibraryA
FreeLibrary
FindResourceA
LoadResource
LockResource
GetVersion
GetCurrentThreadId
GlobalGetAtomNameA
lstrcmpiA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
GetModuleHandleA
GetProcAddress
FileTimeToLocalFileTime
FileTimeToSystemTime
GlobalLock
GlobalUnlock
lstrcpynA
SetLastError
FormatMessageA
LocalFree
WideCharToMultiByte
InterlockedDecrement
MultiByteToWideChar
GetFileAttributesA
lstrcpyA
lstrcatA
GetTempPathA
GetTickCount
GetTempFileNameA
CreateFileA
CloseHandle
WriteFile
DeleteFileA
GetLastError
lstrlenW
GetShortPathNameA
WinExec
lstrlenA
GetEnvironmentStrings
InterlockedIncrement
GrayStringA
RegisterClipboardFormatA
CharUpperA
PostThreadMessageA
CreateDialogIndirectParamA
EndDialog
GetSysColorBrush
LoadCursorA
ClientToScreen
PtInRect
GetClassNameA
LoadStringA
UnregisterClassA
MapDialogRect
SetWindowContextHelpId
MessageBeep
GetNextDlgGroupItem
GetMessageA
TranslateMessage
GetActiveWindow
ValidateRect
GetCursorPos
SetCursor
PostQuitMessage
GetDesktopWindow
GetDC
ReleaseDC
SetRect
CopyAcceleratorTableA
CharNextA
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetNextDlgTabItem
IsWindowEnabled
ShowWindow
MoveWindow
IsDialogMessageA
DrawTextA
LoadIconA
PostMessageA
UpdateWindow
SendDlgItemMessageA
MapWindowPoints
GetSysColor
PeekMessageA
DispatchMessageA
GetFocus
SetActiveWindow
GetWindowDC
SetFocus
AdjustWindowRectEx
GetClientRect
CopyRect
IsWindowVisible
GetTopWindow
IsChild
GetParent
SetWindowTextA
EnableWindow
GetWindowRect
MessageBoxA
RedrawWindow
GetWindowTextA
GetCapture
WinHelpA
wsprintfA
GetClassInfoA
RegisterClassA
GetMenu
GetMenuItemCount
GetSubMenu
GetMenuItemID
GetDlgItem
GetDlgCtrlID
TabbedTextOutA
GetKeyState
DefWindowProcA
GetSystemMetrics
GetWindowPlacement
IsIconic
SystemParametersInfoA
OffsetRect
RegisterWindowMessageA
SetWindowPos
SetWindowLongA
GetWindowLongA
GetWindow
SendMessageA
SetForegroundWindow
GetForegroundWindow
GetLastActivePopup
GetMessagePos
GetMessageTime
RemovePropA
CallWindowProcA
GetPropA
UnhookWindowsHookEx
SetPropA
GetClassLongA
CallNextHookEx
SetWindowsHookExA
CreateWindowExA
DestroyWindow
IsWindow
DestroyMenu
GetViewportExtEx
GetWindowExtEx
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
GetMapMode
DeleteObject
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
RestoreDC
SaveDC
DeleteDC
SetMapMode
LPtoDP
DPtoLP
GetStockObject
GetDeviceCaps
GetBkColor
GetTextColor
CreateBitmap
GetObjectA
SetBkColor
SetTextColor
GetClipBox
ExtCreatePen
SelectObject
Rectangle
GetFileTitleA
ClosePrinter
DocumentPropertiesA
OpenPrinterA
RegSetValueExA
RegCloseKey
RegCreateKeyExA
RegOpenKeyExA
RegQueryValueExA
ord17
ord8
CoFreeUnusedLibraries
OleUninitialize
OleInitialize
CoRegisterMessageFilter
CLSIDFromString
CLSIDFromProgID
CoTaskMemAlloc
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoGetClassObject
StringFromCLSID
CoTaskMemFree
CoRevokeClassObject
OleIsCurrentClipboard
OleFlushClipboard
ord253
SysFreeString
SysAllocStringLen
SysStringLen
SysAllocString
VariantClear
VariantCopy
SysAllocStringByteLen
VariantChangeType
VarBstrFromDate
VariantTimeToSystemTime
ConvertToDCFeX3
CreateFileSystemContainer
CreateIsoTrack
EnumVolumeRelease
MallocArray
MemcpyArrayToArray
RegisterFunction
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.