LpkDllInitialize
LpkDrawTextEx
LpkEditControl
LpkExtTextOut
LpkGetCharacterPlacement
LpkGetTextExtentExPoint
LpkInitialize
LpkPSMTextOut
LpkTabbedTextOut
LpkUseGDIWidthCache
ftsWordBreak
Static task
static1
Behavioral task
behavioral1
Sample
1301f4fa0312f69de49c1d1166244f10_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1301f4fa0312f69de49c1d1166244f10_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
1301f4fa0312f69de49c1d1166244f10_JaffaCakes118
Size
123KB
MD5
1301f4fa0312f69de49c1d1166244f10
SHA1
96524e145ccab81dd19eabe532bb6d2431a203c4
SHA256
3a031c85bda79c8bd406be85dc2b1f6afe395e5c892db15272175baf579279f3
SHA512
f9d44a37811b7d78b7e1b513dc9ebf5cebfb29fb2597bfd9b287c70207ce230e8d6daa41defc251bfa00d597145c6368230cef22bd2021b0016e1bdf7ab5b281
SSDEEP
768:mojY9PLAum/U12tZAW/BXcTjX/O8KDbZS5n6yHEojY9Po:HmLiI2tZ7XqYZon6yH1mg
Checks for missing Authenticode signature.
resource |
---|
1301f4fa0312f69de49c1d1166244f10_JaffaCakes118 |
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
ExitProcess
GetProcAddress
RtlMoveMemory
LoadLibraryW
lstrcatW
GetSystemDirectoryW
FreeLibrary
lstrcpynA
LockResource
LoadResource
SizeofResource
FindResourceW
CreateProcessW
RtlZeroMemory
CloseHandle
WriteFile
CreateFileW
GetTempFileNameW
GetTempPathW
GetLastError
CreateMutexA
lstrcmpiW
GetModuleFileNameW
GetExitCodeProcess
TerminateProcess
WaitForSingleObject
GetCurrentThreadId
GetFileAttributesW
lstrcpyW
GetTickCount
GetLogicalDrives
FindNextFileW
SetFileAttributesW
CopyFileW
FindClose
FindFirstFileW
WaitForMultipleObjects
TerminateThread
ResumeThread
SetThreadPriority
CreateThread
SetEvent
CreateEventW
DisableThreadLibraryCalls
wsprintfW
ord64
ord92
SHRegGetValueW
PathFindExtensionW
PathFindFileNameW
PathAppendW
PathRemoveFileSpecW
StrStrIW
LpkDllInitialize
LpkDrawTextEx
LpkEditControl
LpkExtTextOut
LpkGetCharacterPlacement
LpkGetTextExtentExPoint
LpkInitialize
LpkPSMTextOut
LpkTabbedTextOut
LpkUseGDIWidthCache
ftsWordBreak
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ