LpkDllInitialize
LpkDrawTextEx
LpkEditControl
LpkExtTextOut
LpkGetCharacterPlacement
LpkGetTextExtentExPoint
LpkInitialize
LpkPSMTextOut
LpkTabbedTextOut
LpkUseGDIWidthCache
ftsWordBreak
Static task
static1
Behavioral task
behavioral1
Sample
b8d18b558b27df04ad08f66cfe6b3523_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b8d18b558b27df04ad08f66cfe6b3523_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
b8d18b558b27df04ad08f66cfe6b3523_JaffaCakes118
Size
47KB
MD5
b8d18b558b27df04ad08f66cfe6b3523
SHA1
2daf462bf6c2612052e5881d3c006cf5973c5460
SHA256
0490f9227aa380edb0be66e364238530b662a586c52b9d3d1d419126e4d174b6
SHA512
19f6693989ca5b80b4c13d21a1de405b43814df928d522e061b9e4a8dab89827dc5ba23e9d83fab14138fdf44ada1cf24b88c50a1a50c36da6b48b439b62d98f
SSDEEP
768:lojY9PXAum/U12tZAW/BXcTjX/O8KDbZSMn6yHEojY9Po:wmXiI2tZ7XqYZdn6yH1mg
Checks for missing Authenticode signature.
resource |
---|
b8d18b558b27df04ad08f66cfe6b3523_JaffaCakes118 |
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
ExitProcess
GetProcAddress
RtlMoveMemory
LoadLibraryW
lstrcatW
GetSystemDirectoryW
FreeLibrary
lstrcpynA
LockResource
LoadResource
SizeofResource
FindResourceW
CreateProcessW
RtlZeroMemory
CloseHandle
WriteFile
CreateFileW
GetTempFileNameW
GetTempPathW
GetLastError
CreateMutexA
lstrcmpiW
GetModuleFileNameW
GetExitCodeProcess
TerminateProcess
WaitForSingleObject
GetCurrentThreadId
GetFileAttributesW
lstrcpyW
GetTickCount
GetLogicalDrives
FindNextFileW
SetFileAttributesW
CopyFileW
FindClose
FindFirstFileW
WaitForMultipleObjects
TerminateThread
ResumeThread
SetThreadPriority
CreateThread
SetEvent
CreateEventW
DisableThreadLibraryCalls
wsprintfW
ord64
ord92
SHRegGetValueW
PathFindExtensionW
PathFindFileNameW
PathAppendW
PathRemoveFileSpecW
StrStrIW
LpkDllInitialize
LpkDrawTextEx
LpkEditControl
LpkExtTextOut
LpkGetCharacterPlacement
LpkGetTextExtentExPoint
LpkInitialize
LpkPSMTextOut
LpkTabbedTextOut
LpkUseGDIWidthCache
ftsWordBreak
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ