LpkDllInitialize
LpkDrawTextEx
LpkEditControl
LpkExtTextOut
LpkGetCharacterPlacement
LpkGetTextExtentExPoint
LpkInitialize
LpkPSMTextOut
LpkTabbedTextOut
LpkUseGDIWidthCache
ftsWordBreak
Static task
static1
Behavioral task
behavioral1
Sample
d5b6731e1ed01dd2a08965dd606341f3_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d5b6731e1ed01dd2a08965dd606341f3_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
d5b6731e1ed01dd2a08965dd606341f3_JaffaCakes118
Size
5KB
MD5
d5b6731e1ed01dd2a08965dd606341f3
SHA1
012a8fbb8bd3504f266a4c184e6dab425fb6014c
SHA256
056df9b2272da70140b5478118f2748ef84fc0b257c8615a36140765dd9a7d34
SHA512
8c5b199da7041123e8bf598606a47ed4d374e36f9b31e2162f4e3006dad1eb04f7d367ca20877e45614440d1f2cd92c01b6718aab2f49cdbb9170412f49ea381
SSDEEP
96:IUWst9wIJng/+cgRHn4MlJ8dAnI2MkRLmPdkPdNM8AT/:IKtq2g/+1RH4kJ8dAnjXRLkkS
Checks for missing Authenticode signature.
resource |
---|
d5b6731e1ed01dd2a08965dd606341f3_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
CloseHandle
CreateProcessA
CreateThread
ExitProcess
GetCurrentProcess
GetCurrentProcessId
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GetStartupInfoA
GetSystemDirectoryA
GlobalAlloc
GlobalFree
LoadLibraryA
OpenProcess
ReadProcessMemory
RtlZeroMemory
TerminateProcess
VirtualProtectEx
VirtualQueryEx
WriteProcessMemory
lstrcmpA
MessageBoxA
wsprintfA
PathRemoveExtensionA
PathStripPathA
GetProcessMemoryInfo
LpkDllInitialize
LpkDrawTextEx
LpkEditControl
LpkExtTextOut
LpkGetCharacterPlacement
LpkGetTextExtentExPoint
LpkInitialize
LpkPSMTextOut
LpkTabbedTextOut
LpkUseGDIWidthCache
ftsWordBreak
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ