HookProc
bbb
kingsoft
Static task
static1
Behavioral task
behavioral1
Sample
f97ed045e4fee87d86ed955a8362d770_JaffaCakes118.dll
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
f97ed045e4fee87d86ed955a8362d770_JaffaCakes118.dll
Resource
win10v2004-20240412-en
Target
f97ed045e4fee87d86ed955a8362d770_JaffaCakes118
Size
28KB
MD5
f97ed045e4fee87d86ed955a8362d770
SHA1
a8cccd1fb667b42ca216ec17e4700f593268d5da
SHA256
4854078555fd777499620010bea23a2b36f7723e2f06bc5da945abcc6c4f3fa5
SHA512
e040f6009ce5f4f5046d2631101bbbc74f0aef66de002b83b10e0c4e3acc256a3c90c2612eea13ca692c915efa56a591030944cdd79e8c8bb6c23a9d59bec326
SSDEEP
384:a5W/X3lJCPENmw7cI9a2iVFDczFE18aAoi3aSwW7EvTia2dq1wcX+hBJ+JjEw:a5SX1YEN5zgDczFm8adSwa024wcXebM
Checks for missing Authenticode signature.
resource |
---|
f97ed045e4fee87d86ed955a8362d770_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GlobalLock
GlobalAlloc
GetLastError
CreateMutexA
GetCurrentProcessId
ExitProcess
ResumeThread
WriteProcessMemory
VirtualProtectEx
OpenProcess
GetModuleFileNameA
ReadProcessMemory
GetModuleHandleA
GetPrivateProfileStringA
DeleteFileA
ReadFile
GetTempPathA
VirtualAlloc
WideCharToMultiByte
GlobalUnlock
CreateProcessA
GetSystemDirectoryA
GetTickCount
RaiseException
GetLocalTime
GetCurrentThreadId
SetFilePointer
InitializeCriticalSection
VirtualProtect
LeaveCriticalSection
EnterCriticalSection
Process32First
CreateToolhelp32Snapshot
GlobalFree
GetCommandLineA
IsBadReadPtr
TerminateThread
CreateThread
CreateFileA
WriteFile
CloseHandle
Sleep
GetCurrentProcess
TerminateProcess
LoadLibraryA
MultiByteToWideChar
GetProcAddress
GetWindowThreadProcessId
CallNextHookEx
GetWindowTextA
SetWindowsHookExA
FindWindowA
ImageLoad
ImageUnload
_strupr
_strcmpi
_strlwr
_stricmp
wcslen
atol
srand
rand
strcpy
sprintf
strlen
memcpy
??2@YAPAXI@Z
strrchr
memset
strcat
??3@YAXPAX@Z
strncpy
strchr
strstr
strcmp
__CxxFrameHandler
HookProc
bbb
kingsoft
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ