JumpHookOff
JumpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
ea3fa75bc4623731eafb9e98f0aa4a16_JaffaCakes118.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ea3fa75bc4623731eafb9e98f0aa4a16_JaffaCakes118.dll
Resource
win10v2004-20240226-en
Target
ea3fa75bc4623731eafb9e98f0aa4a16_JaffaCakes118
Size
24KB
MD5
ea3fa75bc4623731eafb9e98f0aa4a16
SHA1
d5a44682d6bd0b8b97889a36d5ea4a1ada989055
SHA256
73be07933d1c8066ce58b41463164e11c670dd5d79a7dded2ffeca8ad58c6b67
SHA512
8502d85bd76ae713f4303cdf36d3556f99084a63ddb09c56be03e64efdd85e73f4ddfecd83b8e53fd664cdbcded73af4733698e3256fc10d05d485c991a0332e
SSDEEP
192:YKno1mFVwCTz8Kz1SKXiOsntX/6PRtG7qXoVITCaaU1hziYm4A1e6k:YKoAFVw6z8O1REtvARt00jdade6k
Checks for missing Authenticode signature.
resource |
---|
ea3fa75bc4623731eafb9e98f0aa4a16_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
LoadLibraryA
CreateEventA
lstrlenA
VirtualProtect
Sleep
WideCharToMultiByte
CloseHandle
TerminateProcess
OpenProcess
GetProcAddress
Process32First
CreateToolhelp32Snapshot
GetModuleFileNameA
UnmapViewOfFile
MapViewOfFile
OpenFileMappingA
CreateThread
CreateMutexA
ReadProcessMemory
GetCurrentDirectoryA
MultiByteToWideChar
WaitForSingleObject
WriteProcessMemory
Process32Next
SetEvent
KillTimer
wsprintfA
DefWindowProcA
SetTimer
PostQuitMessage
DestroyWindow
DispatchMessageA
PostThreadMessageA
LoadCursorA
LoadIconA
UnhookWindowsHookEx
SetWindowsHookExA
CallNextHookEx
RegisterClassA
CreateWindowExA
ShowWindow
UpdateWindow
GetMessageA
TranslateMessage
GetStockObject
RegQueryValueExA
RegOpenKeyA
RegSetValueExA
RegCloseKey
send
InternetCloseHandle
InternetReadFile
InternetOpenUrlA
InternetOpenA
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?find@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDII@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?replace@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@IIABV12@II@Z
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
memset
strcpy
strcat
_strlwr
strlen
memcmp
fclose
fread
fputs
fopen
strcmp
__CxxFrameHandler
??2@YAPAXI@Z
free
_initterm
_adjust_fdiv
_itoa
malloc
JumpHookOff
JumpHookOn
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ