acrxEntryPoint
acrxGetApiVersion
Static task
static1
Behavioral task
behavioral1
Sample
ee830f1e48edc6db662a6c2c587ed541_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ee830f1e48edc6db662a6c2c587ed541_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
ee830f1e48edc6db662a6c2c587ed541_JaffaCakes118
Size
72KB
MD5
ee830f1e48edc6db662a6c2c587ed541
SHA1
b6898a4abf8a04154779d98b53f0b48e95d78de4
SHA256
1d541732dfba478199b2663fe73a57bbec2928e2289f894c5f8ac0f175ba629b
SHA512
2dedd042829f210f47a5961fd0a036489fd12e738008998dac0a0c5ea599e90253d44077bcf575beef807984b3d5bfe51bfd2962edf4c97a0d5d4e04650d53e2
SSDEEP
1536:K7BLyVfUaOoSHRio9iHmbjBeaOcNKFjOW8QoOF1Qcp:K7BmRUroEbjBR2jOW8QoO
Checks for missing Authenticode signature.
resource |
---|
ee830f1e48edc6db662a6c2c587ed541_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
acrxSysRegistry
?desc@AcRxDynamicLinker@@SAPAVAcRxClass@@XZ
??0AcRxObject@@IAE@XZ
?clone@AcRxObject@@UBEPAV1@XZ
?comparedTo@AcRxObject@@UBE?AW4Ordering@AcRx@@PBV1@@Z
?isEqualTo@AcRxObject@@UBEHPBV1@@Z
?copyFrom@AcRxObject@@UAE?AW4ErrorStatus@Acad@@PBV1@@Z
?acDocManagerPtr@@YAPAVAcApDocManager@@XZ
adsw_acadMainWnd
?InitAcUiDLL@@YAXXZ
ord1964
ord5175
ord1362
ord4967
ord3345
ord6277
ord3802
ord6279
ord1522
ord2172
ord2178
ord2405
ord2387
ord2385
ord2403
ord2415
ord2392
ord2408
ord2413
ord2396
ord2398
ord2400
ord2394
ord2410
ord2390
ord934
ord930
ord932
ord928
ord923
ord5233
ord5235
ord5960
ord1600
ord4282
ord4722
ord3403
ord4185
ord6275
ord5073
ord1908
ord5152
ord4244
ord1401
ord3946
ord1617
ord1620
ord5912
ord6724
ord1551
ord1656
ord1671
ord2020
ord4890
ord4735
ord4212
ord5182
ord1024
ord782
ord1440
ord2748
ord3931
ord2288
ord3934
ord4580
ord5529
ord3997
ord5419
ord4081
ord3641
ord764
ord578
ord1489
ord876
ord2902
ord6118
ord299
ord6703
ord1482
ord762
ord1084
ord371
ord1098
ord1175
ord631
ord5403
ord2468
ord907
ord2280
ord386
ord784
ord1670
ord781
ord2322
ord2272
ord911
ord304
ord310
ord2372
ord4108
ord2271
ord865
ord4109
ord908
ord2131
ord785
ord1185
ord1655
ord1599
ord5200
ord2537
ord2731
ord2835
ord4307
ord2714
ord2862
ord2540
ord2646
ord2533
ord3718
ord3719
ord3709
ord2644
ord3949
ord4486
ord4262
ord356
ord370
ord605
ord618
ord1903
ord5712
ord6003
ord265
ord266
ord5203
ord3441
ord297
__CppXcptFilter
_adjust_fdiv
_amsg_exit
_initterm_e
_initterm
_encoded_null
_malloc_crt
_except_handler4_common
_decode_pointer
_onexit
_lock
_encode_pointer
_unlock
atoi
?terminate@@YAXXZ
free
malloc
memcpy
??0exception@std@@QAE@ABV01@@Z
_CxxThrowException
??0exception@std@@QAE@XZ
??1exception@std@@UAE@XZ
?what@exception@std@@UBEPBDXZ
??0exception@std@@QAE@ABQBD@Z
_invalid_parameter_noinfo
memset
__CxxFrameHandler3
_crt_debugger_hook
?_type_info_dtor_internal_method@type_info@@QAEXXZ
atol
__clean_type_info_names_internal
__dllonexit
GetLocaleInfoA
GetACP
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
QueryPerformanceCounter
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
InterlockedCompareExchange
GetExitCodeThread
WaitForSingleObject
TerminateProcess
GetTempPathA
GetLogicalDriveStringsA
GetDriveTypeA
GetSystemDirectoryA
SetFilePointer
SetFileTime
RemoveDirectoryA
SetFileAttributesA
GetFileSize
ReadFile
CopyFileA
WriteFile
CreateFileA
GetFileTime
GetVersionExA
GetModuleHandleA
GetProcAddress
ResumeThread
GetCurrentProcess
CreateToolhelp32Snapshot
Process32First
Process32Next
OpenProcess
VirtualAllocEx
ReadProcessMemory
WriteProcessMemory
VirtualFreeEx
CloseHandle
GetSystemTime
WinExec
DeleteFileA
lstrcmpiA
GetLastError
InterlockedExchange
GetTickCount
Sleep
CreateProcessA
GetThreadLocale
PeekMessageA
SetCursorPos
GetParent
GetWindowTextA
WindowFromPoint
GetWindowRect
mouse_event
GetSystemMetrics
GetCursorPos
ScreenToClient
SetTimer
EnableWindow
PtInRect
ExitWindowsEx
GetWindowThreadProcessId
SendMessageA
ClientToScreen
FindWindowA
FindWindowExA
PostMessageA
InflateRect
KillTimer
OpenServiceA
RegQueryValueExA
RegCreateKeyA
OpenSCManagerA
RegSetValueExA
RegCloseKey
RegOpenKeyExA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
CloseServiceHandle
QueryServiceStatus
RegEnumValueA
URLDownloadToCacheFileA
InternetOpenA
InternetOpenUrlA
InternetCloseHandle
FindFirstUrlCacheEntryA
DeleteUrlCacheEntry
FindNextUrlCacheEntryA
?c_str@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEPBDXZ
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
acrxEntryPoint
acrxGetApiVersion
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ