JumpHookOff
JumpHookOn
ResetSSDT
Static task
static1
Behavioral task
behavioral1
Sample
19b7328126f034439df5f815ae891337_JaffaCakes118.dll
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
19b7328126f034439df5f815ae891337_JaffaCakes118.dll
Resource
win10v2004-20240508-en
Target
19b7328126f034439df5f815ae891337_JaffaCakes118
Size
32KB
MD5
19b7328126f034439df5f815ae891337
SHA1
931dd198fb8bcf8ae09cc22143278f74aec2aa3b
SHA256
09bfd1f4e054a84609bc4db17cf5076782fe2415c77759fe35158301efb08962
SHA512
21f3c7b4a71cf7d9585bf8b6643788d7e29c60c5eb2f7f32aa51f1480f79ac32185eb2172ca4fc5f8edb49fe8f8bffb308b32142c3d7a9e18730bfa7f231ba38
SSDEEP
384:wxer61AS553ls2rj1eO0FOu1viieje1LXagGXUbTns5bY2:drpSLmUj1eOuJ6iejeBXaLoTns5
Checks for missing Authenticode signature.
resource |
---|
19b7328126f034439df5f815ae891337_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
LoadLibraryA
CreateEventA
VirtualProtectEx
GetCurrentProcess
GetCurrentProcessId
VirtualProtect
WideCharToMultiByte
MultiByteToWideChar
CloseHandle
TerminateProcess
OpenProcess
Process32Next
Process32First
CreateToolhelp32Snapshot
GetModuleFileNameA
WriteFile
GetProcAddress
CreateFileA
LoadResource
FindResourceA
DeviceIoControl
FreeLibrary
GlobalFree
LoadLibraryExA
ReadFile
GetFileSize
SetFileAttributesA
lstrcatA
GetSystemDirectoryA
UnmapViewOfFile
MapViewOfFile
OpenFileMappingA
CreateThread
CreateMutexA
ReadProcessMemory
GetModuleHandleA
GlobalAlloc
GlobalLock
GetCurrentDirectoryA
lstrlenA
WaitForSingleObject
WriteProcessMemory
Sleep
SetEvent
SizeofResource
GetLastError
PostThreadMessageA
LoadCursorA
UnhookWindowsHookEx
SetWindowsHookExA
CallNextHookEx
KillTimer
RegisterClassA
CreateWindowExA
wsprintfA
LoadIconA
DefWindowProcA
SetTimer
PostQuitMessage
DestroyWindow
DispatchMessageA
ShowWindow
UpdateWindow
GetMessageA
TranslateMessage
GetStockObject
OpenSCManagerA
RegCloseKey
RegSetValueExA
RegOpenKeyA
RegQueryValueExA
ControlService
CloseServiceHandle
OpenServiceA
StartServiceA
SetupDiGetClassDevsA
SetupDiEnumDeviceInfo
SetupDiGetDeviceRegistryPropertyA
SetupDiSetClassInstallParamsA
SetupDiCallClassInstaller
SetupDiDestroyDeviceInfoList
memcpy
fread
??3@YAXPAX@Z
_strlwr
??2@YAPAXI@Z
_initterm
_adjust_fdiv
_itoa
strcmp
fopen
fputs
fclose
strcat
memset
strcpy
_mbsicmp
malloc
free
memcmp
printf
__CxxFrameHandler
strlen
send
InternetCloseHandle
InternetOpenA
InternetOpenUrlA
InternetReadFile
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?find@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDII@Z
?replace@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@IIABV12@II@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
JumpHookOff
JumpHookOn
ResetSSDT
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ