SetDIPSHook
SetMIRSHook
Behavioral task
behavioral1
Sample
272c83cfe0d05284bc1776adc2916b7b_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
272c83cfe0d05284bc1776adc2916b7b_JaffaCakes118.dll
Resource
win10v2004-20240704-en
Target
272c83cfe0d05284bc1776adc2916b7b_JaffaCakes118
Size
22KB
MD5
272c83cfe0d05284bc1776adc2916b7b
SHA1
f6f0b9b70dd49e2ccfb2883feec1397ad89b893d
SHA256
bdfdd44e2ed8ca08fce66e9ad6ccbf3124c792d33fd3dfd832dad56482ccc1c4
SHA512
19f0295d055ac494dd5c24d5e234396bc5c253437b05113cbda49d3170c8be5833dd4bb82de2f6963c40474fae984cda703903a8ccae529232e128064685392f
SSDEEP
96:A902jRuf0mziKVDcW20Wfg8y+z+7vnViW53LiP1TN0ZUOy73b:u0eutbWY8y57o/YUOc3b
resource | yara_rule |
---|---|
sample | upx |
Checks for missing Authenticode signature.
resource |
---|
272c83cfe0d05284bc1776adc2916b7b_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Beep
UnmapViewOfFile
MapViewOfFile
CloseHandle
OpenFileMappingA
GetModuleFileNameA
GetLocalTime
memmove
_initterm
malloc
sprintf
strcpy
_itoa
_adjust_fdiv
free
strstr
strcat
strlen
_onexit
strtok
__dllonexit
UnhookWindowsHookEx
IsWindow
SendMessageA
FindWindowA
PostThreadMessageA
MessageBoxA
GetWindowThreadProcessId
CallNextHookEx
SetWindowsHookExA
SetDIPSHook
SetMIRSHook
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE