SetMyHook
UnMyHook
jksHook
jtzHook
Behavioral task
behavioral1
Sample
23cb7dbef8f5e168ae560ec18f1acae9_JaffaCakes118.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
23cb7dbef8f5e168ae560ec18f1acae9_JaffaCakes118.dll
Resource
win10v2004-20240611-en
Target
23cb7dbef8f5e168ae560ec18f1acae9_JaffaCakes118
Size
61KB
MD5
23cb7dbef8f5e168ae560ec18f1acae9
SHA1
ef19772152f27e687cdee67add0601a8f1a74734
SHA256
e828341fa8acbc57f6e7f1547ca324bea86cc2a4e442f588f7c4c416834f711e
SHA512
6d73eafe47075936cb306a666ad82dc776d6a60f6ed992df6e11b5d4330a124f04dd06db1e898ea1d9879bcdb47f66e4fa93d1db3a1134c81e03bfa56ae7115e
SSDEEP
768:FqZiTOVZe34pi/oz3KSx37n9T0frWwvCpIu6mmnWgA:w5EuiM6Sx3B0fKwKpI51A
resource | yara_rule |
---|---|
sample | upx |
Checks for missing Authenticode signature.
resource |
---|
23cb7dbef8f5e168ae560ec18f1acae9_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
WriteProcessMemory
VirtualProtectEx
VirtualFree
VirtualAlloc
UnmapViewOfFile
TerminateProcess
Sleep
SetSystemTime
SetFilePointer
ReadProcessMemory
ReadFile
OpenProcess
OpenMutexA
OpenFileMappingA
MoveFileExA
MapViewOfFile
LoadLibraryA
GetWindowsDirectoryA
GetTickCount
GetThreadPriority
GetSystemTime
GetSystemDefaultLangID
GetProcAddress
GetOEMCP
GetModuleHandleA
GetModuleFileNameA
GetLastError
GetCurrentProcess
FindFirstFileA
FindClose
DeleteFileA
CreateThread
CreateProcessA
CreateMutexA
CreateFileMappingA
CreateFileA
CompareStringA
CloseHandle
GetCurrentThreadId
WideCharToMultiByte
MultiByteToWideChar
ExitProcess
UnhandledExceptionFilter
RtlUnwind
RaiseException
TlsSetValue
TlsGetValue
TlsFree
TlsAlloc
LocalFree
LocalAlloc
FreeLibrary
HeapFree
HeapReAlloc
HeapAlloc
GetProcessHeap
RegSetValueExA
RegSaveKeyA
RegRestoreKeyA
RegQueryValueExA
RegOpenKeyExA
RegOpenKeyA
RegCreateKeyExA
RegCreateKeyA
RegCloseKey
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
GetTextColor
GetTextAlign
GetSystemPaletteUse
EqualRgn
mouse_event
UnhookWindowsHookEx
ToAscii
ShowWindow
SetWindowsHookExA
SetThreadDesktop
SendMessageA
PostThreadMessageA
PostMessageA
MessageBoxA
MapVirtualKeyA
IsWindow
IsMenu
IsDlgButtonChecked
GetWindowThreadProcessId
GetWindowTextLengthA
GetWindowTextA
GetWindowDC
GetUpdateRgn
GetSystemMetrics
GetParent
GetWindow
GetMessageTime
GetMessageA
GetKeyboardState
GetKBCodePage
GetForegroundWindow
GetDoubleClickTime
GetDlgItem
GetDesktopWindow
GetClassNameA
FindWindowExA
FindWindowA
EnableWindow
CreateDesktopA
CloseDesktop
CallNextHookEx
WSACleanup
WSAStartup
gethostbyname
socket
send
recv
inet_ntoa
htons
connect
closesocket
SetMyHook
UnMyHook
jksHook
jtzHook
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE