DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
cfi_Inject
cfi_StartHook
cfi_StopHook
Static task
static1
Behavioral task
behavioral1
Sample
03db64faf767deabbdf81e95f37c04f6_JaffaCakes118.dll
Resource
win7-20240903-en
Target
03db64faf767deabbdf81e95f37c04f6_JaffaCakes118
Size
192KB
MD5
03db64faf767deabbdf81e95f37c04f6
SHA1
3197c6d276d5bf2ac7ba474cb930934490bdd3b5
SHA256
a257d21fad1075217630316caf23e7a4d9fb2f86a24a32aecd1ac30c960912bd
SHA512
81b39c8f3097052433744df99cd6510f802d7f6fbc7cc735c46db43a9c538f73d0a9242bccb8710cea0fc31ec73cba87bdb159e5692d183d06dbe30cdbe77c23
SSDEEP
3072:p9NkAs3vNMzIduJ0fUq1mp5WeT9u7dlHsNr/r:HNkAsFSlqYjWH7O
Checks for missing Authenticode signature.
resource |
---|
03db64faf767deabbdf81e95f37c04f6_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
SetEndOfFile
GetOEMCP
GetACP
SetFilePointer
FlushFileBuffers
SetStdHandle
GetStringTypeW
GetStringTypeA
GetCPInfo
IsBadCodePtr
IsBadReadPtr
SetUnhandledExceptionFilter
WriteFile
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetFileType
GetStdHandle
SetHandleCount
IsBadWritePtr
VirtualAlloc
VirtualFree
HeapCreate
ReadFile
HeapSize
TerminateProcess
LCMapStringW
LCMapStringA
ExitProcess
TlsGetValue
SetLastError
TlsFree
TlsAlloc
TlsSetValue
GetVersion
GetCommandLineA
HeapReAlloc
HeapAlloc
RtlUnwind
InterlockedExchange
Sleep
UnmapViewOfFile
CreateFileA
CreateFileMappingA
MapViewOfFile
WinExec
IsDBCSLeadByte
LoadLibraryExA
FindResourceA
LoadResource
SizeofResource
HeapDestroy
InterlockedIncrement
DeleteCriticalSection
InitializeCriticalSection
DisableThreadLibraryCalls
CreateMutexA
GetLastError
GetShortPathNameA
FreeLibrary
FindFirstFileW
FindNextFileW
FindClose
ExpandEnvironmentStringsW
LocalFree
lstrcatW
GetModuleFileNameW
LoadLibraryW
lstrcmpiW
lstrcpynW
lstrlenW
GetProcessHeap
HeapFree
WriteProcessMemory
CreateToolhelp32Snapshot
Module32First
Module32Next
lstrlenA
lstrcmpiA
GetCurrentProcessId
CloseHandle
OpenProcess
GetModuleFileNameA
lstrcatA
GetSystemDefaultLangID
GetPrivateProfileIntA
GetPrivateProfileStringA
lstrcpyW
lstrcmpA
lstrcpyA
WideCharToMultiByte
MultiByteToWideChar
lstrcpynA
GetModuleHandleA
GetVersionExA
InterlockedDecrement
EnterCriticalSection
LeaveCriticalSection
GetCurrentProcess
FlushInstructionCache
GetCurrentThreadId
LoadLibraryA
GetProcAddress
GetStartupInfoA
SetWindowTextA
GetCursorPos
SetTimer
UpdateWindow
DefWindowProcA
IsWindow
GetWindowRect
GetDlgCtrlID
GetWindowTextW
GetWindowTextLengthW
SetWindowTextW
PostMessageW
SendMessageW
DrawTextW
FindWindowExW
LoadImageW
LoadIconW
FindWindowW
GetClassNameW
SetWindowsHookExW
wsprintfW
CharNextA
DrawIconEx
GetWindowDC
LoadImageA
GetWindowThreadProcessId
FillRect
GetFocus
LoadIconA
DestroyIcon
FindWindowExA
GetSysColor
SendMessageA
GetWindowTextLengthA
SetFocus
LoadBitmapA
CallWindowProcW
SetWindowLongW
GetClassNameA
GetParent
GetWindowLongW
FindWindowA
GetSystemMetrics
GetClassInfoExA
LoadCursorA
wsprintfA
RegisterClassExA
ReleaseDC
EndPaint
CreateWindowExA
CallWindowProcA
GetWindowLongA
SetWindowLongA
CallNextHookEx
UnhookWindowsHookEx
SetWindowsHookExA
ReleaseCapture
SetCapture
PtInRect
GetDC
InflateRect
BeginPaint
SystemParametersInfoA
ShowWindow
PostMessageA
MoveWindow
SetWindowRgn
ScreenToClient
OffsetRect
SetRectEmpty
GetClientRect
DrawFrameControl
GetWindowTextA
DrawTextA
IsRectEmpty
CopyRect
KillTimer
SetStretchBltMode
StretchBlt
ExtTextOutA
GetStockObject
GetObjectA
CreateFontIndirectA
DeleteObject
SetBkColor
SelectObject
CreateCompatibleDC
SetTextColor
SetBkMode
FrameRgn
OffsetRgn
CreateSolidBrush
ExcludeClipRect
SetWindowOrgEx
GetClipBox
BitBlt
EqualRgn
CombineRgn
CreateRectRgn
CreatePolygonRgn
SetViewportOrgEx
GetViewportOrgEx
SetPixel
GetTextExtentPoint32A
GetTextExtentPointA
GetTextExtentPoint32W
GetTextExtentPointW
DeleteDC
CreateCompatibleBitmap
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
RegQueryInfoKeyA
RegEnumValueA
RegSetValueExA
RegCreateKeyExA
RegDeleteKeyA
RegQueryValueExW
RegEnumKeyExW
RegQueryInfoKeyW
RegOpenKeyExW
RegDeleteValueA
RegDeleteKeyW
RegCreateKeyExW
RegSetValueExW
RegEnumValueW
RegEnumKeyExA
SHGetDesktopFolder
SHGetSpecialFolderPathW
SHGetMalloc
SHGetSpecialFolderLocation
ShellExecuteA
CoTaskMemAlloc
CoFreeUnusedLibraries
CoInitialize
CoCreateInstance
CoUninitialize
CoTaskMemFree
CoTaskMemRealloc
RegisterTypeLi
LoadTypeLi
SysAllocString
SysFreeString
OleTranslateColor
SysStringLen
VarUI4FromStr
LoadRegTypeLi
UrlApplySchemeW
StrRetToBufW
PathIsURLW
StrCpyW
StrDupW
StrStrW
StrStrIW
StrStrA
StrStrIA
StrCmpW
StrRStrIW
PathFileExistsW
PathIsDirectoryW
StrCmpNIW
StrDupA
PathAppendA
PathRemoveFileSpecA
StrNCatW
StrCmpIW
InternetCrackUrlW
ImageList_AddMasked
ImageList_Create
ImageList_Draw
ImageList_SetBkColor
ImageList_GetIconSize
ImageList_ReplaceIcon
ImageList_Remove
ImageList_Destroy
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
cfi_Inject
cfi_StartHook
cfi_StopHook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ