DllWord8
DllWordCopy
DllWordCopyAll
DllWordPaste
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_6a59d9731e4a47cb0428e149c835dc40.dll
Resource
win7-20240729-en
Target
JaffaCakes118_6a59d9731e4a47cb0428e149c835dc40
Size
220KB
MD5
6a59d9731e4a47cb0428e149c835dc40
SHA1
c7fc2ffb906d43e54060239d272c04ffb85666a0
SHA256
5aed5430766c5bdad20c300955473248497d50646bd4ac56e1d3b6c6e54be46b
SHA512
693050b556978d26ad151e4ad23ed55a2b572f5fbfaffa583c95cded82dd7cedd2c55aa2ebeecd2a220672852eafe75ac47ea2e56019a11423999e655467e928
SSDEEP
3072:YFo63IvP2/48lOFoh8xwk6ISc1neJ0rBFBByidL20Sp/FG51JOFgowUt5wXR:YFlQvwYnimB5D20e/FuJEwUT0R
Checks for missing Authenticode signature.
resource |
---|
JaffaCakes118_6a59d9731e4a47cb0428e149c835dc40 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetOEMCP
RtlUnwind
GetCommandLineA
ExitProcess
TerminateProcess
HeapFree
HeapAlloc
RaiseException
HeapReAlloc
GetACP
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapSize
HeapCreate
VirtualFree
GetCPInfo
DeleteCriticalSection
SetUnhandledExceptionFilter
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
SetStdHandle
InterlockedIncrement
CloseHandle
GetModuleFileNameA
GlobalLock
GlobalAlloc
GlobalDeleteAtom
lstrcmpA
lstrcmpiA
GetCurrentThread
SetFilePointer
FlushFileBuffers
WriteFile
GetCurrentProcess
GetProcessVersion
FormatMessageA
LoadLibraryA
FreeLibrary
GlobalGetAtomNameA
GetLastError
GlobalAddAtomA
GlobalFindAtomA
SetLastError
GetModuleHandleA
GetProcAddress
WritePrivateProfileStringA
GlobalFlags
lstrcpyA
GetVersion
lstrcpynA
TlsGetValue
lstrcatA
SetErrorMode
EnterCriticalSection
LocalReAlloc
TlsSetValue
TlsFree
GlobalReAlloc
LeaveCriticalSection
GlobalFree
GlobalHandle
GlobalUnlock
VirtualAlloc
TlsAlloc
GetCurrentThreadId
InitializeCriticalSection
LocalFree
LocalAlloc
WideCharToMultiByte
InterlockedDecrement
lstrlenA
MultiByteToWideChar
IsBadWritePtr
GetEnvironmentStrings
HeapDestroy
LoadStringA
GetSysColorBrush
DestroyMenu
SetPropA
GetPropA
CallWindowProcA
RemovePropA
GetMessageTime
GetMessagePos
GetForegroundWindow
SetForegroundWindow
RegisterWindowMessageA
SystemParametersInfoA
IsIconic
GetWindowPlacement
SetFocus
ShowWindow
SetWindowPos
SetWindowLongA
GrayStringA
DrawTextA
TabbedTextOutA
MapWindowPoints
LoadIconA
LoadCursorA
GetMenuItemCount
wsprintfA
GetWindowTextA
SetWindowTextA
ClientToScreen
GetWindow
GetDlgCtrlID
GetWindowRect
PtInRect
UnregisterClassA
UnhookWindowsHookEx
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
GetKeyState
CallNextHookEx
ValidateRect
IsWindowVisible
GetSysColor
AdjustWindowRectEx
GetClientRect
PeekMessageA
GetCursorPos
SetWindowsHookExA
GetParent
GetLastActivePopup
IsWindowEnabled
GetWindowLongA
MessageBoxA
EnableWindow
SetCursor
SendMessageA
PostMessageA
ReleaseDC
CopyRect
PostQuitMessage
GetClassNameA
GetTopWindow
GetClassInfoA
GetCapture
WinHelpA
GetSubMenu
RegisterClassA
GetMenu
GetMenuItemID
CreateWindowExA
DefWindowProcA
DestroyWindow
GetDC
GetClassLongA
GetDlgItem
GetSystemMetrics
RestoreDC
SelectObject
GetStockObject
SetBkColor
SetTextColor
SetMapMode
OffsetViewportOrgEx
SetViewportExtEx
SetViewportOrgEx
ScaleViewportExtEx
ScaleWindowExtEx
GetClipBox
SetWindowExtEx
DeleteObject
DeleteDC
GetDeviceCaps
RectVisible
TextOutA
PtVisible
Escape
ExtTextOutA
GetObjectA
SaveDC
CreateBitmap
ClosePrinter
DocumentPropertiesA
OpenPrinterA
RegCloseKey
RegCreateKeyExA
RegOpenKeyExA
RegSetValueExA
ord17
CLSIDFromProgID
VariantClear
SysStringLen
SysAllocString
SysFreeString
VariantChangeType
GetActiveObject
DllWord8
DllWordCopy
DllWordCopyAll
DllWordPaste
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE