EnHookWindow
UninstallHook
sub_getmessage
sub_keyboard
sub_mouse
Static task
static1
Behavioral task
behavioral1
Sample
19dd4f75956c40b859330ab5c1061e17_JaffaCakes118.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
19dd4f75956c40b859330ab5c1061e17_JaffaCakes118.dll
Resource
win10v2004-20240508-en
Target
19dd4f75956c40b859330ab5c1061e17_JaffaCakes118
Size
19KB
MD5
19dd4f75956c40b859330ab5c1061e17
SHA1
41f6de09434851777604e0685fab93c322c5c7fb
SHA256
1cbadf66a624a89cead91929376f46e23dbbd450a58dba465ee85b1fa15ef549
SHA512
9bfe13893cf7f489dadef84e1c8aae2c10768dd0ba90b0f090358578fff6c9a8662fadb6098759a30dc096a4b4b45cf134af72b22d7690820d40dc7348c2781b
SSDEEP
384:NzFNAKBCysiH6wFtkLV/tbfMPmyMMOQvrd:ZCyswFMVbfdMOQv
Checks for missing Authenticode signature.
resource |
---|
19dd4f75956c40b859330ab5c1061e17_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetWindowTextA
GetMessageA
GetForegroundWindow
GetClassNameA
wsprintfA
lstrlenA
lstrcpyA
lstrcmpiA
CloseHandle
CreateFileA
CreateThread
DisableThreadLibraryCalls
GetCurrentDirectoryA
GetCurrentProcess
GetModuleFileNameA
GetModuleHandleA
GetPrivateProfileStringA
GetProcAddress
GetSystemDirectoryA
GlobalAlloc
LoadLibraryA
MultiByteToWideChar
ReadFile
RtlMoveMemory
RtlZeroMemory
SetFileAttributesA
SetFilePointer
Sleep
TerminateProcess
VirtualProtectEx
WideCharToMultiByte
lstrcatA
lstrcmpA
RegQueryValueExA
EnHookWindow
UninstallHook
sub_getmessage
sub_keyboard
sub_mouse
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ