CheckVolumeTextureRequirements
CreatePatchMesh
GetImageInfoFromFileInMemory
GetImageInfoFromResourceW
LoadLayer
QuaternionSquad
Vec2TransformNormalArray
Static task
static1
Behavioral task
behavioral1
Sample
b8732e1c4911eb73051d07b043260838_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b8732e1c4911eb73051d07b043260838_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
b8732e1c4911eb73051d07b043260838_JaffaCakes118
Size
287KB
MD5
b8732e1c4911eb73051d07b043260838
SHA1
0b88153422c990817f00266bf77f1c2ec5fc4833
SHA256
d18c604494133b3bf582796f4d326898e5c85385b2dcb5f12a9c1cc8a3f466b1
SHA512
66c46ac0ab81a3451b312ae33e48c852f46785f53a6e3fb6051e82b71101fe655dd5e6f6b881c75ea71cead0e3c3992cb4ef8626d2fbb99807f8e8f6a8ddbbbf
SSDEEP
6144:2dG050l3L23sZseiBLUFrkhq/iuVCKRDarMXCJO9IUf9:2dGWisjCR/84WoXCqIUf9
Checks for missing Authenticode signature.
resource |
---|
b8732e1c4911eb73051d07b043260838_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IsDBCSLeadByte
IsProcessorFeaturePresent
LeaveCriticalSection
LoadLibraryA
LoadLibraryExA
LoadResource
LockResource
MulDiv
MultiByteToWideChar
QueryPerformanceCounter
RaiseException
SetLastError
SizeofResource
VirtualAlloc
VirtualFree
VirtualProtect
WideCharToMultiByte
lstrcmpA
lstrcmpiA
lstrcpynA
lstrlenA
lstrlenW
DisableThreadLibraryCalls
EnterCriticalSection
ExitProcess
FindResourceA
FlushInstructionCache
FreeLibrary
GetACP
InterlockedIncrement
InterlockedExchange
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetLastError
GetLocaleInfoA
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GetProcessHeap
GetProcessPriorityBoost
GetSystemTimeAsFileTime
GetThreadLocale
InterlockedDecrement
InterlockedCompareExchange
InitializeCriticalSection
HeapFree
HeapAlloc
GlobalUnlock
GlobalLock
GlobalHandle
GlobalFree
GlobalAlloc
GetVersionExA
GetTickCount
DeleteCriticalSection
DragAcceptFiles
SHExtractIconsW
SHGetMalloc
SHGetSpecialFolderLocation
SHLoadNonloadedIconOverlayIdentifiers
ExtractIconW
ord17
VariantInit
VariantClear
VarUI4FromStr
VarDecFromI2
SysStringLen
SysFreeString
SysAllocStringLen
LoadRegTypeLi
LoadTypeLi
SafeArrayCreateVector
SysAllocString
SetTextColor
SetGraphicsMode
SetViewportOrgEx
SetWindowOrgEx
SelectObject
SaveDC
RestoreDC
PlayEnhMetaFile
ModifyWorldTransform
GetStockObject
GetObjectA
GetDeviceCaps
DeleteObject
DPtoLP
CreateSolidBrush
CreateCompatibleDC
CreateCompatibleBitmap
BitBlt
SetBkMode
GetActiveWindow
GetClassInfoExA
GetClientRect
GetCursorPos
GetDC
GetDesktopWindow
GetDlgCtrlID
GetDlgItem
GetFocus
GetParent
GetWindow
GetWindowRect
GetWindowTextA
CreateWindowExA
InvalidateRgn
IsWindow
LoadStringA
MapDialogRect
FillRect
PtInRect
RedrawWindow
RegisterClassExA
RegisterWindowMessageA
ReleaseCapture
ReleaseDC
SendMessageA
SetCapture
SetCursor
SetWindowContextHelpId
SetWindowLongA
SetWindowTextA
UnregisterClassA
wsprintfA
CopyImage
CharNextA
CallWindowProcA
BeginPaint
EndPaint
EndDialog
EnableWindow
DestroyWindow
DeregisterShellHookWindow
MessageBoxA
DefWindowProcA
GetWindowTextLengthA
DirectDrawCreateClipper
RegSetValueExA
RegQueryValueExA
RegQueryInfoKeyA
RegOpenKeyExA
RegEnumKeyExA
RegDeleteValueA
RegDeleteKeyA
RegCreateKeyExA
RegCloseKey
CheckVolumeTextureRequirements
CreatePatchMesh
GetImageInfoFromFileInMemory
GetImageInfoFromResourceW
LoadLayer
QuaternionSquad
Vec2TransformNormalArray
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ