DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
cfi_Inject
cfi_StartHook
cfi_StopHook
Static task
static1
Behavioral task
behavioral1
Sample
00277646a5b80b7017dc557f5427f8d5_JaffaCakes118.dll
Resource
win7-20240903-en
Target
00277646a5b80b7017dc557f5427f8d5_JaffaCakes118
Size
192KB
MD5
00277646a5b80b7017dc557f5427f8d5
SHA1
55122bad580558792f4b53eda678d430f038f186
SHA256
a6393a94eee0b3e669546e905d8c8128ca6f5589f50bd67d6f1bedcac8dfc7b3
SHA512
3dd4fe4446c7aef19bc9351ecb8907a164dbcde921cb98426346644a1ea5d8a51f9607e11ee3a9afc5b2c46c406da8ada010551fa139f18c97932f37d8767606
SSDEEP
3072:p9NkAs3vNMzIduJ0fUq1mp5WeT9u7dlHsNr/L:HNkAsFSlqYjWH7u
Checks for missing Authenticode signature.
resource |
---|
00277646a5b80b7017dc557f5427f8d5_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
SetEndOfFile
GetOEMCP
GetACP
SetFilePointer
FlushFileBuffers
SetStdHandle
GetStringTypeW
GetStringTypeA
GetCPInfo
IsBadCodePtr
IsBadReadPtr
SetUnhandledExceptionFilter
WriteFile
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetFileType
GetStdHandle
SetHandleCount
IsBadWritePtr
VirtualAlloc
VirtualFree
HeapCreate
ReadFile
HeapSize
TerminateProcess
LCMapStringW
LCMapStringA
ExitProcess
TlsGetValue
SetLastError
TlsFree
TlsAlloc
TlsSetValue
GetVersion
GetCommandLineA
HeapReAlloc
HeapAlloc
RtlUnwind
InterlockedExchange
Sleep
UnmapViewOfFile
CreateFileA
CreateFileMappingA
MapViewOfFile
WinExec
IsDBCSLeadByte
LoadLibraryExA
FindResourceA
LoadResource
SizeofResource
HeapDestroy
InterlockedIncrement
DeleteCriticalSection
InitializeCriticalSection
DisableThreadLibraryCalls
CreateMutexA
GetLastError
GetShortPathNameA
FreeLibrary
FindFirstFileW
FindNextFileW
FindClose
ExpandEnvironmentStringsW
LocalFree
lstrcatW
GetModuleFileNameW
LoadLibraryW
lstrcmpiW
lstrcpynW
lstrlenW
GetProcessHeap
HeapFree
WriteProcessMemory
CreateToolhelp32Snapshot
Module32First
Module32Next
lstrlenA
lstrcmpiA
GetCurrentProcessId
CloseHandle
OpenProcess
GetModuleFileNameA
lstrcatA
GetSystemDefaultLangID
GetPrivateProfileIntA
GetPrivateProfileStringA
lstrcpyW
lstrcmpA
lstrcpyA
WideCharToMultiByte
MultiByteToWideChar
lstrcpynA
GetModuleHandleA
GetVersionExA
InterlockedDecrement
EnterCriticalSection
LeaveCriticalSection
GetCurrentProcess
FlushInstructionCache
GetCurrentThreadId
LoadLibraryA
GetProcAddress
GetStartupInfoA
SetWindowTextA
GetCursorPos
SetTimer
UpdateWindow
DefWindowProcA
IsWindow
GetWindowRect
GetDlgCtrlID
GetWindowTextW
GetWindowTextLengthW
SetWindowTextW
PostMessageW
SendMessageW
DrawTextW
FindWindowExW
LoadImageW
LoadIconW
FindWindowW
GetClassNameW
SetWindowsHookExW
wsprintfW
CharNextA
DrawIconEx
GetWindowDC
LoadImageA
GetWindowThreadProcessId
FillRect
GetFocus
LoadIconA
DestroyIcon
FindWindowExA
GetSysColor
SendMessageA
GetWindowTextLengthA
SetFocus
LoadBitmapA
CallWindowProcW
SetWindowLongW
GetClassNameA
GetParent
GetWindowLongW
FindWindowA
GetSystemMetrics
GetClassInfoExA
LoadCursorA
wsprintfA
RegisterClassExA
ReleaseDC
EndPaint
CreateWindowExA
CallWindowProcA
GetWindowLongA
SetWindowLongA
CallNextHookEx
UnhookWindowsHookEx
SetWindowsHookExA
ReleaseCapture
SetCapture
PtInRect
GetDC
InflateRect
BeginPaint
SystemParametersInfoA
ShowWindow
PostMessageA
MoveWindow
SetWindowRgn
ScreenToClient
OffsetRect
SetRectEmpty
GetClientRect
DrawFrameControl
GetWindowTextA
DrawTextA
IsRectEmpty
CopyRect
KillTimer
SetStretchBltMode
StretchBlt
ExtTextOutA
GetStockObject
GetObjectA
CreateFontIndirectA
DeleteObject
SetBkColor
SelectObject
CreateCompatibleDC
SetTextColor
SetBkMode
FrameRgn
OffsetRgn
CreateSolidBrush
ExcludeClipRect
SetWindowOrgEx
GetClipBox
BitBlt
EqualRgn
CombineRgn
CreateRectRgn
CreatePolygonRgn
SetViewportOrgEx
GetViewportOrgEx
SetPixel
GetTextExtentPoint32A
GetTextExtentPointA
GetTextExtentPoint32W
GetTextExtentPointW
DeleteDC
CreateCompatibleBitmap
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
RegQueryInfoKeyA
RegEnumValueA
RegSetValueExA
RegCreateKeyExA
RegDeleteKeyA
RegQueryValueExW
RegEnumKeyExW
RegQueryInfoKeyW
RegOpenKeyExW
RegDeleteValueA
RegDeleteKeyW
RegCreateKeyExW
RegSetValueExW
RegEnumValueW
RegEnumKeyExA
SHGetDesktopFolder
SHGetSpecialFolderPathW
SHGetMalloc
SHGetSpecialFolderLocation
ShellExecuteA
CoTaskMemAlloc
CoFreeUnusedLibraries
CoInitialize
CoCreateInstance
CoUninitialize
CoTaskMemFree
CoTaskMemRealloc
RegisterTypeLi
LoadTypeLi
SysAllocString
SysFreeString
OleTranslateColor
SysStringLen
VarUI4FromStr
LoadRegTypeLi
UrlApplySchemeW
StrRetToBufW
PathIsURLW
StrCpyW
StrDupW
StrStrW
StrStrIW
StrStrA
StrStrIA
StrCmpW
StrRStrIW
PathFileExistsW
PathIsDirectoryW
StrCmpNIW
StrDupA
PathAppendA
PathRemoveFileSpecA
StrNCatW
StrCmpIW
InternetCrackUrlW
ImageList_AddMasked
ImageList_Create
ImageList_Draw
ImageList_SetBkColor
ImageList_GetIconSize
ImageList_ReplaceIcon
ImageList_Remove
ImageList_Destroy
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
cfi_Inject
cfi_StartHook
cfi_StopHook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ