EnHookWindow
UninstallHook
sub_getmessage
sub_keyboard
sub_mouse
Static task
static1
Behavioral task
behavioral1
Sample
ed03f6ea57b0cb75a53e9ed94f186b12_JaffaCakes118.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ed03f6ea57b0cb75a53e9ed94f186b12_JaffaCakes118.dll
Resource
win10v2004-20240226-en
Target
ed03f6ea57b0cb75a53e9ed94f186b12_JaffaCakes118
Size
16KB
MD5
ed03f6ea57b0cb75a53e9ed94f186b12
SHA1
c6e2248f43c765c927ae28417ba6132ef5518d26
SHA256
bf9f0a5089eac30d3b4f4fd36833d6fec06d6ef40adb1595714bea950252e0bb
SHA512
d59f74fbdfa873635d9bc6f78d4e36e7593b526c81f8c0740bc0dc9e787dc254cb05e3ab9672ea2575916393bed9a4a23a844164f315d25f3f455912f5ac9c0f
SSDEEP
192:S3Jznb5RZ3WLZQQf3UITnace5xxdqo2qlkNhK1e46V26i2sT899AdGq:S3JzvQ52hxxd2qmjio2f2c89cGq
Checks for missing Authenticode signature.
resource |
---|
ed03f6ea57b0cb75a53e9ed94f186b12_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
UnhookWindowsHookEx
SetWindowsHookExA
GetMessageA
CallNextHookEx
wsprintfA
Module32First
lstrlenA
lstrcpyA
lstrcmpA
lstrcatA
WriteProcessMemory
CloseHandle
CreateFileA
CreateThread
CreateToolhelp32Snapshot
DisableThreadLibraryCalls
GetCurrentProcess
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GetSystemDirectoryA
GlobalAlloc
LoadLibraryA
Module32Next
Process32First
Process32Next
ReadFile
RtlZeroMemory
SetFileAttributesA
SetFilePointer
Sleep
TerminateProcess
VirtualProtectEx
WideCharToMultiByte
EnHookWindow
UninstallHook
sub_getmessage
sub_keyboard
sub_mouse
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ