ClearRSInfo
PutRSInfo
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_49994990f4730dd51cb0b3acaad07a00.dll
Resource
win7-20240729-en
Target
JaffaCakes118_49994990f4730dd51cb0b3acaad07a00
Size
184KB
MD5
49994990f4730dd51cb0b3acaad07a00
SHA1
b9e420d4da45abd56557e53ce182491b888be11f
SHA256
25bd9427ecce35b26fbf2983d3b682e7a38009bbbce5972c795992081be0b718
SHA512
17c3becd4f709db32933d9105fa98eddf2c5df7aa225dc5f58900ee533e437db6515ca70ccaafc11ee3b0ac158018541b9fe33df781f371cd324003a9a1103d0
SSDEEP
3072:LeuJVTztyP0fWycQyqrRpoiYHBK6Q/vXF9Zpf6LFv9JfA96:L/zgcA/qc0tR6ZHf
Checks for missing Authenticode signature.
resource |
---|
JaffaCakes118_49994990f4730dd51cb0b3acaad07a00 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GlobalFlags
GetFileAttributesA
GetFileSize
GetFileTime
GetModuleHandleA
GlobalDeleteAtom
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
FreeLibrary
GetProcessVersion
GetCPInfo
GetOEMCP
RtlUnwind
GetCommandLineA
RaiseException
GetTimeZoneInformation
InterlockedIncrement
HeapAlloc
HeapFree
HeapSize
HeapReAlloc
GetACP
ExitProcess
TerminateProcess
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
SetUnhandledExceptionFilter
VirtualAlloc
IsBadWritePtr
GetStringTypeA
GetStringTypeW
LCMapStringA
LCMapStringW
IsBadReadPtr
IsBadCodePtr
SetStdHandle
CompareStringA
CompareStringW
SetEnvironmentVariableA
lstrcmpA
SetLastError
FormatMessageA
GetVersion
lstrcatA
SetErrorMode
InterlockedDecrement
TlsGetValue
LocalReAlloc
TlsSetValue
EnterCriticalSection
GlobalAlloc
GlobalReAlloc
LeaveCriticalSection
TlsFree
GlobalHandle
GlobalFree
DeleteCriticalSection
TlsAlloc
InitializeCriticalSection
LocalFree
LocalAlloc
GetCurrentThreadId
GetModuleFileNameA
lstrcmpiA
GetFullPathNameA
lstrcpynA
GetVolumeInformationA
FindFirstFileA
FindClose
lstrcpyA
LoadLibraryA
GetProcAddress
SetEndOfFile
UnlockFile
LockFile
CloseHandle
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
CreateFileA
GetCurrentProcess
DuplicateHandle
GetLastError
FileTimeToLocalFileTime
FileTimeToSystemTime
WideCharToMultiByte
GlobalLock
GlobalUnlock
lstrlenA
MultiByteToWideChar
CoInitialize
CoCreateInstance
CoUninitialize
VariantCopy
VariantClear
SysAllocString
SafeArrayCreate
SafeArrayAccessData
SafeArrayUnaccessData
ord17
MapWindowPoints
PostMessageA
LoadIconA
LoadCursorA
GetSysColorBrush
ReleaseDC
GetDC
TabbedTextOutA
DrawTextA
GrayStringA
PostQuitMessage
DestroyMenu
AdjustWindowRectEx
GetClientRect
CopyRect
GetTopWindow
GetCapture
WinHelpA
GetClassInfoA
RegisterClassA
GetMenu
GetDlgItem
DestroyWindow
CreateWindowExA
GetSysColor
SetPropA
GetPropA
CallWindowProcA
RemovePropA
DefWindowProcA
GetMessageTime
GetMessagePos
GetForegroundWindow
SetForegroundWindow
SetWindowLongA
SetWindowPos
RegisterWindowMessageA
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetMenuCheckMarkDimensions
LoadBitmapA
ModifyMenuA
CheckMenuItem
EnableMenuItem
GetNextDlgTabItem
GetLastActivePopup
IsWindowEnabled
MessageBoxA
EnableWindow
SetFocus
GetFocus
GetParent
SetWindowTextA
ClientToScreen
GetWindow
GetDlgCtrlID
GetWindowRect
PtInRect
GetWindowLongA
GetClassNameA
GetWindowTextA
CharUpperA
GetSystemMetrics
SetWindowsHookExA
LoadStringA
GetMenuItemCount
GetSubMenu
GetMenuState
GetMenuItemID
GetClassLongA
PeekMessageA
CallNextHookEx
GetKeyState
SendMessageA
DispatchMessageA
UnhookWindowsHookEx
UnregisterClassA
SetMenuItemBitmaps
DeleteDC
GetObjectA
SetBkColor
SetTextColor
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
GetClipBox
CreateBitmap
DeleteObject
GetDeviceCaps
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
GetStockObject
SelectObject
RestoreDC
SaveDC
DocumentPropertiesA
OpenPrinterA
ClosePrinter
GetFileTitleA
ClearRSInfo
PutRSInfo
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE