AlphaBlend
DllInitialize
GradientFill
TransparentBlt
vSetDdrawflag
Static task
static1
Behavioral task
behavioral1
Sample
f6a94a38b07084844dd126092b4504d2_JaffaCakes118.dll
Resource
win7-20240708-en
Target
f6a94a38b07084844dd126092b4504d2_JaffaCakes118
Size
164KB
MD5
f6a94a38b07084844dd126092b4504d2
SHA1
75af8ff1b42df6771125a3d94502b26bfaa5feb5
SHA256
f8a8bd6d526806066ebff164e2f6a26eeb6b6d7791c3f362b30d01b38824b043
SHA512
aadeb537764439d7d1962173ac7a68b808d214e6e5eefd7aa1b1c5aa71af60676cdddc9cb0fb1da034750763c4ddbb920ab04ba75d8a415d4abf4ff76006fc1c
SSDEEP
3072:GdAeyq2UsqGiZVGsYFM7FZJa4+bO3xJflldXDmqKcd5CsCpE8B:Ghb5RBJapOBJtrXKcqsCpE8B
Checks for missing Authenticode signature.
resource |
---|
f6a94a38b07084844dd126092b4504d2_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetProcAddress
LoadLibraryA
GetModuleHandleA
OutputDebugStringA
GetSystemDirectoryA
GetCommandLineA
GetVersion
HeapAlloc
EnterCriticalSection
LeaveCriticalSection
ExitProcess
TerminateProcess
GetCurrentProcess
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
GetLastError
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
HeapFree
WriteFile
VirtualAlloc
HeapReAlloc
InitializeCriticalSection
RtlUnwind
InterlockedDecrement
InterlockedIncrement
GetCPInfo
GetACP
GetOEMCP
FlushFileBuffers
SetFilePointer
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
CloseHandle
SetStdHandle
AlphaBlend
DllInitialize
GradientFill
TransparentBlt
vSetDdrawflag
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ