JumpHookOff
JumpHookOn
SetHook
UnHook
Static task
static1
Behavioral task
behavioral1
Sample
25443f68b118cd95c17f04ceb908b224_JaffaCakes118.dll
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
25443f68b118cd95c17f04ceb908b224_JaffaCakes118.dll
Resource
win10v2004-20240611-en
Target
25443f68b118cd95c17f04ceb908b224_JaffaCakes118
Size
24KB
MD5
25443f68b118cd95c17f04ceb908b224
SHA1
6bae103700856cfd2e14aea8d76836d4857c6165
SHA256
ae8aefb3b29f9c2366fdddb024c4ef0365e583deba40160b230e583e6a5383b0
SHA512
70868061bfb9d87093e204a98786474567d3c1e143ff49c8dab285626476ba5aad787e2885f7025ed8d7b066579a70f0be2aeba3451e12ddd75f72d6f93cd460
SSDEEP
192:AcptBpwZ2kKsD0ouVp4cHkl5vgaYH1xypnotiYotiz6fnuKh4lTfWKI:AYpwAjsIZpBHkjg91xye6fOTfWK
Checks for missing Authenticode signature.
resource |
---|
25443f68b118cd95c17f04ceb908b224_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Process32First
CreateToolhelp32Snapshot
GetModuleFileNameA
UnmapViewOfFile
MapViewOfFile
OpenFileMappingA
LoadLibraryA
CreateThread
CreateMutexA
VirtualProtect
WriteProcessMemory
Process32Next
GetProcAddress
CreateEventA
GetSystemDirectoryA
SetEvent
WaitForSingleObject
MultiByteToWideChar
ExitProcess
lstrlenA
WideCharToMultiByte
GetCurrentDirectoryA
OpenProcess
TerminateProcess
CloseHandle
ReadProcessMemory
Sleep
SetTimer
SetWindowsHookExA
UnhookWindowsHookEx
DispatchMessageA
wsprintfA
KillTimer
PostThreadMessageA
CallNextHookEx
GetMessageA
TranslateMessage
RegCloseKey
RegOpenKeyA
RegQueryValueExA
RegSetValueExA
InternetOpenUrlA
InternetCloseHandle
InternetOpenA
InternetReadFile
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?find@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDII@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
fclose
_adjust_fdiv
fread
memcpy
strncmp
_itoa
exit
memcmp
fopen
free
_initterm
_strlwr
malloc
strcat
strcpy
strlen
strcmp
memset
??2@YAPAXI@Z
__CxxFrameHandler
_EH_prolog
rename
WSAGetLastError
recv
__WSAFDIsSet
select
connect
socket
gethostbyname
inet_addr
htons
WSAStartup
closesocket
send
JumpHookOff
JumpHookOn
SetHook
UnHook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ