SUNHACK1
SUNHACK3
ServiceRouteEx
StartServiceEx
StopServiceEx
UNHACK6
Static task
static1
Behavioral task
behavioral1
Sample
07d40dcca36b2c13716e672f655ae187_JaffaCakes118.dll
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
07d40dcca36b2c13716e672f655ae187_JaffaCakes118.dll
Resource
win10v2004-20240508-en
Target
07d40dcca36b2c13716e672f655ae187_JaffaCakes118
Size
24KB
MD5
07d40dcca36b2c13716e672f655ae187
SHA1
5d54b0dfed7dba79f98a2a8d7d6e3cbd4eb8309e
SHA256
211d945a082b15c63ebf92190ea65ec05ad9258c5599b7331f4fb2d042610c4d
SHA512
d45c3f5db11e99fc7b968ff606a44c79b47d14f660118043034d3b2a8faf6b5addb414df7f917883cc4a48793dceab53e159fc46b606433a45ce495f7e3cc225
SSDEEP
192:OjeaQOdWi9ROgeUeqrqiNd3a9uBBQ6PRQkbYa2qBICC2+E5WMcgdcTXwqU:8mKLaiq9uBBQARQk5xNClE5WMcMy
Checks for missing Authenticode signature.
resource |
---|
07d40dcca36b2c13716e672f655ae187_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
lstrlenA
ExitProcess
Sleep
VirtualProtect
CreateThread
IsBadReadPtr
lstrcatA
CloseHandle
GetModuleFileNameA
SetTimer
wsprintfA
CallNextHookEx
UnhookWindowsHookEx
SetWindowsHookExA
gethostname
InternetOpenUrlA
InternetOpenA
InternetCloseHandle
InternetReadFile
_adjust_fdiv
malloc
_initterm
free
strcmp
strrchr
strlen
memset
strcpy
strcat
memcmp
exit
_strlwr
_itoa
SUNHACK1
SUNHACK3
ServiceRouteEx
StartServiceEx
StopServiceEx
UNHACK6
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ