EnHookWindow
UninstallHook
sub_getmessage
sub_keyboard
sub_mouse
Static task
static1
Behavioral task
behavioral1
Sample
1c1161ba8298a5a1bfa492540f1c3835_JaffaCakes118.dll
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
1c1161ba8298a5a1bfa492540f1c3835_JaffaCakes118.dll
Resource
win10v2004-20240226-en
Target
1c1161ba8298a5a1bfa492540f1c3835_JaffaCakes118
Size
104KB
MD5
1c1161ba8298a5a1bfa492540f1c3835
SHA1
a45d165ef6394f59490d8b15debcfbc420bf68a0
SHA256
d3573f5fd2cbb7fff20165db0780716adb43c5dac65ac18ac7ed9f8dd7da8d9b
SHA512
eda2bada74e3a3be3fd8f599881e02b7e0adf20aa02617597dbd924ea61906bd39178fcca66681563fcc02d741881339fe723a666dd14d77a731cee17317a187
SSDEEP
1536:o1hz+B6Y021hz+B6Y021hz+B6Y021hz+B6Y0:AhDY0ShDY0ShDY0ShDY0
Checks for missing Authenticode signature.
resource |
---|
1c1161ba8298a5a1bfa492540f1c3835_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetWindowTextA
GetForegroundWindow
GetDC
GetClientRect
GetClassNameA
wsprintfA
GetSystemDirectoryA
GetTempPathA
GlobalAlloc
LoadLibraryA
MultiByteToWideChar
ReadFile
RtlMoveMemory
RtlZeroMemory
DeleteFileA
SetFilePointer
Sleep
TerminateProcess
GetProcAddress
VirtualFree
VirtualProtectEx
WideCharToMultiByte
lstrcatA
lstrcmpA
lstrcmpiA
lstrcpyA
lstrcpynA
lstrlenA
CreateThread
CreateFileA
GetModuleFileNameA
CloseHandle
GetFileSize
GetCurrentProcess
ExitThread
VirtualAlloc
DisableThreadLibraryCalls
SetFileAttributesA
RegQueryValueExA
StrStrA
StrChrA
CreateCompatibleDC
SelectObject
DeleteDC
BitBlt
CreateCompatibleBitmap
DeleteObject
CLSIDFromString
GdiplusShutdown
GdipSaveImageToFile
GdipDisposeImage
GdipCreateBitmapFromHBITMAP
GdiplusStartup
closesocket
connect
gethostbyname
inet_addr
ntohs
recv
send
socket
WSACleanup
WSAStartup
strrchr
EnHookWindow
UninstallHook
sub_getmessage
sub_keyboard
sub_mouse
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ