ComputeTangentFrameEx
CreateCubeTextureFromResourceExW
GatherFragmentsFromFileA
LoadMemoryTile
LoadMeshHierarchyFromXA
StartDecompressBuffer
StopSaveData
Vec2TransformCoordArray
mpegInSeekFrame
Static task
static1
Behavioral task
behavioral1
Sample
15c3235b9907423ce35b81e65fe0dc71_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
15c3235b9907423ce35b81e65fe0dc71_JaffaCakes118.dll
Resource
win10v2004-20240802-en
Target
15c3235b9907423ce35b81e65fe0dc71_JaffaCakes118
Size
308KB
MD5
15c3235b9907423ce35b81e65fe0dc71
SHA1
68f028b4391aa969916f4e5491f833fb92e274dc
SHA256
b8c97bdd5d0f14a979ca86dfe37ea894018ee69e9b6fe0e29e54b92bd293edfc
SHA512
64c4959140128429ce59fa7c23dea0616888c8dceeca77dd64e864b4335b140630806ba9f53114e8217b2cd2f818690ba959cfcf62cb2be3518a1d23a73792fe
SSDEEP
6144:3ySBPRoDW415nxCb2sWJ65tvgQZvq29V/t5wgHDavXh5E5FJkPw:3yCoPHYA8wzvXrEqPw
Checks for missing Authenticode signature.
resource |
---|
15c3235b9907423ce35b81e65fe0dc71_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IsWindow
CallWindowProcA
CharNextA
CreateAcceleratorTableA
CreateWindowExA
DefWindowProcA
DestroyAcceleratorTable
DestroyWindow
DialogBoxIndirectParamA
EnableWindow
EndDialog
EndPaint
FillRect
wsprintfA
UnregisterClassA
SetWindowTextA
SetWindowPos
SetWindowLongA
SetWindowContextHelpId
SetFocus
SetCursor
SetCapture
SendMessageA
ReleaseDC
ReleaseCapture
RegisterWindowMessageA
RegisterClassExA
RedrawWindow
PtInRect
MessageBoxA
MapDialogRect
LoadStringA
LoadCursorA
BeginPaint
IsChild
InvalidateRgn
InvalidateRect
GetWindowTextLengthA
GetWindowTextA
GetWindowRect
GetWindowLongA
GetWindow
GetSysColor
GetParent
GetFocus
GetDlgItem
GetDlgCtrlID
GetDesktopWindow
GetDC
GetCursorPos
GetClientRect
GetClassNameA
GetClassInfoExA
GetActiveWindow
CLSIDFromProgID
CLSIDFromString
CoCreateInstance
CoGetClassObject
CoTaskMemAlloc
CoTaskMemFree
CoTaskMemRealloc
CreateStreamOnHGlobal
OleInitialize
OleLockRunning
OleUninitialize
StringFromGUID2
SetViewportOrgEx
SetTextColor
SetGraphicsMode
SetBkMode
SelectObject
SaveDC
RestoreDC
ModifyWorldTransform
GetStockObject
GetObjectA
GetDeviceCaps
DeleteObject
DeleteDC
DPtoLP
CreateSolidBrush
CreateFontIndirectA
CreateCompatibleDC
CreateCompatibleBitmap
BitBlt
SetWindowOrgEx
RegDeleteKeyA
RegCreateKeyExA
RegCloseKey
RegDeleteValueA
RegSetValueExA
RegQueryValueExA
RegQueryInfoKeyA
RegOpenKeyExA
RegEnumKeyExA
DirectDrawEnumerateA
DSoundHelp
VariantInit
VariantClear
VarUI4FromStr
SysStringLen
SysStringByteLen
SysFreeString
SysAllocStringLen
SysAllocString
LoadRegTypeLi
LoadTypeLi
OleCreateFontIndirect
InterlockedExchange
InterlockedDecrement
InterlockedCompareExchange
InitializeCriticalSection
HeapFree
HeapAlloc
GlobalUnlock
GlobalLock
GlobalHandle
GlobalFree
lstrlenA
GetVersionExA
GetTickCount
GetThreadLocale
lstrlenW
InterlockedIncrement
GetProcessHeap
GetProcAddress
GetModuleHandleA
GetModuleFileNameA
GetLocaleInfoA
GetLastError
GetCurrentThreadId
GetCurrentProcessId
GetCurrentProcess
GetACP
FreeLibrary
FlushInstructionCache
FindResourceA
ExitProcess
EnterCriticalSection
DisableThreadLibraryCalls
IsDBCSLeadByte
IsProcessorFeaturePresent
LeaveCriticalSection
LoadLibraryA
LoadLibraryExA
LoadResource
LockResource
MulDiv
MultiByteToWideChar
QueryPerformanceCounter
RaiseException
SetLastError
SizeofResource
VirtualAlloc
VirtualFree
VirtualProtect
WideCharToMultiByte
lstrcmpA
lstrcmpiA
GetProcessPriorityBoost
lstrcpynA
GetSystemTimeAsFileTime
GlobalAlloc
DeleteCriticalSection
ord17
SheSetCurDrive
SHGetSpecialFolderLocation
SHGetInstanceExplorer
SHGetDiskFreeSpaceA
SHExtractIconsW
SHAppBarMessage
SHAddToRecentDocs
DragFinish
CommandLineToArgvW
ComputeTangentFrameEx
CreateCubeTextureFromResourceExW
GatherFragmentsFromFileA
LoadMemoryTile
LoadMeshHierarchyFromXA
StartDecompressBuffer
StopSaveData
Vec2TransformCoordArray
mpegInSeekFrame
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ