Adh
Always
ConfigCast
GetPlayerVersion
HaahSBd
IJHEHd
PlayA
PrioritSetAd
PutAdSpecial
PutAdsware
SetAdrkOn
StandupYoured
UPAdInfo
adee
jlkjde
plkeAq
Static task
static1
Behavioral task
behavioral1
Sample
4205bd0a38cc2dd54df6ecf057d1e317_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4205bd0a38cc2dd54df6ecf057d1e317_JaffaCakes118.dll
Resource
win10v2004-20241007-en
Target
4205bd0a38cc2dd54df6ecf057d1e317_JaffaCakes118
Size
636KB
MD5
4205bd0a38cc2dd54df6ecf057d1e317
SHA1
a1fedb6250053142c57fe7b3bb35b61debf4977e
SHA256
0ed3bf4d977f654c38ee55303ddf431427fbd55a36ce3d5efb8a8608ddca7f9c
SHA512
440dbf5f9b4ccbe6e2c8669e0a0ee5a34f5461307ceca77788c23c37df2e7bc061a69792271c624d484fdf31bbb69520d585e65e5aba94272a68e50ab100ce8c
SSDEEP
12288:0c2PkJ5n4AZQ4VfJsSkXd0aL1PN7Bdx+nY+XDlWpVQ05N7voMLMgw2So2pNu1:0JyyaPaJj2/XDop2SN71LpCNu1
Checks for missing Authenticode signature.
resource |
---|
4205bd0a38cc2dd54df6ecf057d1e317_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
WSAStartup
WSACleanup
gethostbyname
CoTaskMemFree
OleLockRunning
CoTaskMemAlloc
CLSIDFromString
CLSIDFromProgID
CoGetClassObject
OleInitialize
CreateStreamOnHGlobal
OleUninitialize
StringFromGUID2
CoUninitialize
CoInitialize
CoCreateInstance
CoTaskMemRealloc
InternetCrackUrlA
InternetReadFile
FindFirstUrlCacheEntryA
FindNextUrlCacheEntryA
InternetOpenUrlA
GetUrlCacheEntryInfoA
DeleteUrlCacheEntry
InternetOpenA
InternetConnectA
InternetCloseHandle
HttpOpenRequestA
HttpSendRequestA
URLDownloadToFileA
InitializeCriticalSection
DeleteCriticalSection
RaiseException
MapViewOfFile
CreateFileMappingA
OpenFileMappingA
CloseHandle
UnmapViewOfFile
ReleaseMutex
FlushViewOfFile
WaitForSingleObject
CreateMutexA
FindClose
FindFirstFileA
SetFileAttributesA
GetLastError
SearchPathA
GetSystemTimeAsFileTime
SetErrorMode
Sleep
DeleteFileA
GetTempFileNameA
GetTempPathA
CopyFileA
SetFilePointer
GetWindowsDirectoryA
GetSystemDirectoryA
MultiByteToWideChar
GetShortPathNameA
GetVolumeInformationA
CreateDirectoryA
FindNextFileA
lstrcmpA
lstrcatA
lstrcpyA
GetVersionExA
SetProcessWorkingSetSize
GetCurrentProcess
GetTickCount
InterlockedExchange
GetACP
GetLocaleInfoA
GetThreadLocale
lstrlenA
GetCurrentThreadId
HeapAlloc
GetProcessHeap
FlushInstructionCache
lstrlenW
GetModuleFileNameA
GlobalUnlock
GlobalLock
GlobalAlloc
InterlockedDecrement
WideCharToMultiByte
HeapFree
InterlockedIncrement
MulDiv
EnterCriticalSection
LeaveCriticalSection
WriteFile
GetFileSize
CreateFileA
GetBinaryTypeA
GetLocalTime
SetEndOfFile
GetCurrentDirectoryA
FlushFileBuffers
GetPrivateProfileSectionA
GetModuleHandleA
FreeLibrary
SizeofResource
LoadResource
FindResourceA
LoadLibraryExA
lstrcmpiA
lstrcpynA
IsDBCSLeadByte
GetFileAttributesA
GetProcAddress
LoadLibraryA
CreateThread
SetEvent
WaitForMultipleObjects
CreateEventA
GetFullPathNameA
OpenEventA
CreateProcessA
Module32Next
Module32First
CreateToolhelp32Snapshot
Process32Next
Process32First
ReadFile
TerminateProcess
DeviceIoControl
VirtualAlloc
VirtualFree
GetStdHandle
QueryPerformanceCounter
TlsSetValue
TlsFree
SetLastError
TlsAlloc
GetCPInfo
LCMapStringW
LCMapStringA
RemoveDirectoryA
GetCommandLineA
VirtualQuery
GetSystemInfo
VirtualProtect
HeapReAlloc
GetDriveTypeA
FileTimeToLocalFileTime
FileTimeToSystemTime
ExitProcess
RtlUnwind
GetOEMCP
SetUnhandledExceptionFilter
HeapDestroy
HeapCreate
IsBadWritePtr
SetHandleCount
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
UnhandledExceptionFilter
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
IsValidCodePage
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
SetStdHandle
GetTimeZoneInformation
GetLocaleInfoW
CompareStringA
CompareStringW
SetEnvironmentVariableA
LocalFree
TlsGetValue
GetCurrentProcessId
HeapSize
UnlockFile
GetDlgItem
InvalidateRgn
InvalidateRect
SetCapture
ReleaseCapture
CreateAcceleratorTableA
GetDesktopWindow
CharNextA
GetClassNameA
RedrawWindow
IsWindow
BeginPaint
FillRect
EndPaint
IsChild
SetFocus
GetFocus
GetWindow
GetSysColor
DestroyAcceleratorTable
GetWindowTextLengthA
GetWindowTextA
RegisterWindowMessageA
GetClassInfoExA
LoadCursorA
RegisterClassExA
EnumWindows
KillTimer
SetTimer
MoveWindow
SetWindowTextA
SendMessageA
GetWindowLongA
DispatchMessageA
TranslateMessage
GetForegroundWindow
SystemParametersInfoA
MapWindowPoints
ShowWindow
UpdateWindow
SetWindowLongA
CreateWindowExA
CallWindowProcA
DestroyWindow
FindWindowExA
PostMessageA
DefWindowProcA
SetActiveWindow
SetWindowPos
PostQuitMessage
AdjustWindowRectEx
wsprintfA
ReleaseDC
GetDC
SetWindowRgn
GetWindowRect
GetClientRect
GetSystemMetrics
LoadImageA
UnregisterClassA
SetForegroundWindow
PeekMessageA
GetParent
GetMessageA
GetStockObject
GetObjectA
GetDeviceCaps
CreateSolidBrush
CreateCompatibleBitmap
BitBlt
GetTextCharsetInfo
SelectObject
CreateCompatibleDC
DeleteDC
CombineRgn
DeleteObject
CreateRectRgn
GetPixel
SaveDC
RestoreDC
RegQueryValueExA
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
RegEnumKeyExA
RegOpenKeyExA
RegDeleteValueA
RegDeleteKeyA
RegSetKeySecurity
RegQueryValueA
RegQueryInfoKeyA
GetUserNameA
RegCreateKeyExA
RegCreateKeyA
RegSetValueExA
RegNotifyChangeKeyValue
RegCloseKey
RegOpenKeyA
VarUI4FromStr
OleCreateFontIndirect
SysStringByteLen
SysStringLen
LoadTypeLi
LoadRegTypeLi
VariantClear
SysAllocString
VariantInit
SysAllocStringLen
SysFreeString
DispCallFunc
Adh
Always
ConfigCast
GetPlayerVersion
HaahSBd
IJHEHd
PlayA
PrioritSetAd
PutAdSpecial
PutAdsware
SetAdrkOn
StandupYoured
UPAdInfo
adee
jlkjde
plkeAq
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ