DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
Windows 7 will be removed from tria.ge on 2025-03-31
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_62110f9f0a012c01928c8ef91393794e.dll
Resource
win7-20240729-en
Target
JaffaCakes118_62110f9f0a012c01928c8ef91393794e
Size
260KB
MD5
62110f9f0a012c01928c8ef91393794e
SHA1
bae0d181461204d9fcf968cf83947439c577edf3
SHA256
7f7fe1795449083d02818dade798dcbebbf7a44e792b20ce5d1050b4aa0e479b
SHA512
8b6e3c1af11746b38a47c8c49dc175995e69a39f714076092be68aa0af4eabf7dd5a7af18a3bb035db58f76f4edf6224de7237bf6d44c517d731bd5a88d2742b
SSDEEP
3072:+m07c4fHCp/AZX/AGUBUpV7Os2kKerYVSrfishHwJjocVFEnT2XDd48bf29UV6:U7dHCc/ASsad1rasdUVUT2TTf2B
Checks for missing Authenticode signature.
resource |
---|
JaffaCakes118_62110f9f0a012c01928c8ef91393794e |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
HeapDestroy
GetTickCount
TerminateProcess
WaitForSingleObject
GlobalUnlock
lstrcpyA
EnterCriticalSection
LeaveCriticalSection
FlushFileBuffers
SetStdHandle
IsBadCodePtr
IsBadReadPtr
GetOEMCP
GetACP
GetCPInfo
GetStringTypeW
GetStringTypeA
SetUnhandledExceptionFilter
lstrlenW
VirtualAlloc
DeleteCriticalSection
HeapCreate
GetEnvironmentVariableA
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
LCMapStringW
LCMapStringA
HeapSize
HeapReAlloc
ExitProcess
TlsGetValue
TlsFree
TlsAlloc
TlsSetValue
HeapAlloc
RaiseException
HeapFree
GetCommandLineA
RtlUnwind
GetShortPathNameA
InitializeCriticalSection
DisableThreadLibraryCalls
lstrcmpiA
FreeLibrary
FindResourceA
LoadResource
LockResource
GetCurrentProcess
FlushInstructionCache
InterlockedDecrement
InterlockedIncrement
GetCurrentThreadId
GetModuleHandleA
GetModuleFileNameA
lstrcatA
LoadLibraryA
GetProcAddress
GlobalFree
GlobalAlloc
VirtualFree
GlobalLock
WideCharToMultiByte
MultiByteToWideChar
lstrlenA
GetFileAttributesA
GetLastError
IsBadWritePtr
SetLastError
ReadFile
SearchPathA
Sleep
InterlockedExchange
GetLocalTime
GetCurrentProcessId
GetVersion
GetWindowsDirectoryA
FormatMessageA
LocalFree
lstrcpynA
WriteFile
CreateFileA
SetFilePointer
CloseHandle
CompareStringA
CompareStringW
GetVersionExA
ScreenToClient
GetWindowRect
FillRect
wsprintfA
GetSysColor
CopyRect
OffsetRect
DrawTextA
GetDlgCtrlID
GetDlgItemTextA
GetWindowDC
EnumChildWindows
IntersectRect
GetClassNameA
MessageBeep
BeginPaint
EndPaint
SendMessageA
UpdateWindow
GetWindow
SystemParametersInfoA
MapWindowPoints
CreateDialogIndirectParamA
GetWindowPlacement
ClientToScreen
GetSystemMetrics
SetFocus
SetDlgItemTextA
GetParent
InvalidateRect
DialogBoxParamA
GetSystemMenu
RemoveMenu
LoadStringA
AppendMenuA
GetClientRect
GetClassInfoExA
GetDlgItem
GetWindowTextLengthA
GetWindowTextA
CallWindowProcA
DefWindowProcA
CreateWindowExA
LoadIconA
ShowWindow
SetWindowRgn
IsIconic
DestroyWindow
GetDesktopWindow
EnableWindow
SetCapture
LoadCursorA
SetCursor
ReleaseCapture
SetWindowTextA
IsWindow
GetDC
ReleaseDC
GetWindowLongA
SetWindowLongA
SetWindowPos
MoveWindow
RegisterClassExA
CreateCompatibleBitmap
CreateCompatibleDC
GetObjectA
BitBlt
DeleteDC
DeleteMetaFile
GetTextExtentPoint32A
GetStockObject
Rectangle
CreateRectRgn
GetDeviceCaps
CreateFontIndirectA
CreateSolidBrush
DeleteObject
SaveDC
SelectObject
SetBkMode
SetTextColor
TextOutA
RestoreDC
EnumFontFamiliesExA
RegDeleteKeyA
RegOpenKeyExA
RegCreateKeyExA
RegCloseKey
RegSetValueExA
RegEnumKeyExA
RegQueryValueExA
RegOpenKeyA
ProgIDFromCLSID
CoTaskMemFree
StringFromCLSID
SysAllocString
LoadRegTypeLi
SysAllocStringLen
SysStringLen
SysReAllocStringLen
SysFreeString
SetErrorInfo
CreateErrorInfo
GetErrorInfo
sndPlaySoundA
mciSendCommandA
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
SHGetSpecialFolderLocation
SHGetPathFromIDListA
SHGetMalloc
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE