JumpHookOff
JumpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
262ccd64c698413eabc7f36cc12dc2dd_JaffaCakes118.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
262ccd64c698413eabc7f36cc12dc2dd_JaffaCakes118.dll
Resource
win10v2004-20240704-en
Target
262ccd64c698413eabc7f36cc12dc2dd_JaffaCakes118
Size
24KB
MD5
262ccd64c698413eabc7f36cc12dc2dd
SHA1
04cb4f9e45398ec50b7545683646aba6206b7251
SHA256
880bb5a1337989cf30b6932d472e8b1571ac2f67847d64364e1700dd93a30613
SHA512
32ad0415acc068f6a0635d6236b330614f8a13c9cb95e1fcb63dfb583fc535b09e4c53d936d4f6d33a832413435deb06c8a046d21549dedafc9dcdfe695cbec6
SSDEEP
384:u+iUeAiNiApdn4YNDUg4BAwjndavaqB3b:u+sAiA8prNDUg4xbdavNV
Checks for missing Authenticode signature.
resource |
---|
262ccd64c698413eabc7f36cc12dc2dd_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetCurrentProcess
GetCurrentProcessId
GetProcAddress
LoadLibraryA
CreateEventA
GlobalLock
GlobalAlloc
GetModuleHandleA
Sleep
WideCharToMultiByte
MultiByteToWideChar
VirtualProtect
VirtualProtectEx
TerminateProcess
OpenProcess
Process32Next
Process32First
CreateToolhelp32Snapshot
GetModuleFileNameA
UnmapViewOfFile
MapViewOfFile
OpenFileMappingA
CreateThread
CreateMutexA
ReadProcessMemory
GetCurrentDirectoryA
lstrlenA
WaitForSingleObject
WriteProcessMemory
CloseHandle
SetEvent
KillTimer
wsprintfA
DefWindowProcA
SetTimer
PostQuitMessage
DestroyWindow
DispatchMessageA
PostThreadMessageA
LoadCursorA
UnhookWindowsHookEx
SetWindowsHookExA
CallNextHookEx
LoadIconA
RegisterClassA
CreateWindowExA
ShowWindow
UpdateWindow
GetMessageA
TranslateMessage
GetStockObject
RegQueryValueExA
RegOpenKeyA
RegSetValueExA
RegCloseKey
send
InternetCloseHandle
InternetReadFile
InternetOpenUrlA
InternetOpenA
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?replace@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@IIABV12@II@Z
?find@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDII@Z
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
_strlwr
memcmp
memset
strcpy
strcat
fclose
fputs
fopen
strcmp
fread
memcpy
strlen
__CxxFrameHandler
??2@YAPAXI@Z
free
_initterm
malloc
_adjust_fdiv
_itoa
JumpHookOff
JumpHookOn
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ