StartHook2
StopHook2
Behavioral task
behavioral1
Sample
26fa374f37c22e18ae05886813bb1f21_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
26fa374f37c22e18ae05886813bb1f21_JaffaCakes118.dll
Resource
win10v2004-20240704-en
Target
26fa374f37c22e18ae05886813bb1f21_JaffaCakes118
Size
65KB
MD5
26fa374f37c22e18ae05886813bb1f21
SHA1
10addfff18fc65ab192d98677997d4dc472afd25
SHA256
4edb0c5576fd35d0ec2f19bb5581b409d57fe0c54874ea40ff2c871f177fefa4
SHA512
ae2fae5bde71c7d3c0c403abee02b90f066228fd3296d9693f0064cafb5a5bd74568f1a7e78e0590c952ce369a9485e2ca1d3381eaaac321cc982952af9b3864
SSDEEP
768:OsFmEgX67FxVr7E95sc2FBTeqIXAo+J5QMWgP:5FBG6j57EbsVFBTO/+7P
resource | yara_rule |
---|---|
sample | upx |
Checks for missing Authenticode signature.
resource |
---|
26fa374f37c22e18ae05886813bb1f21_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
WriteProcessMemory
VirtualFree
VirtualAlloc
UnmapViewOfFile
TerminateProcess
Sleep
SetSystemTime
SetFilePointer
ReadProcessMemory
ReadFile
OpenProcess
OpenMutexA
OpenFileMappingA
MoveFileExA
MapViewOfFile
LoadLibraryA
GetWindowsDirectoryA
GetTickCount
GetSystemTime
GetProcAddress
GetModuleHandleA
GetModuleFileNameA
GetLastError
GetCurrentProcess
GetComputerNameA
GetCommandLineA
FindFirstFileA
FindClose
DeleteFileA
CreateThread
CreateProcessA
CreateMutexA
CreateFileMappingA
CreateFileA
CompareStringA
CloseHandle
GetCurrentThreadId
WideCharToMultiByte
MultiByteToWideChar
ExitProcess
UnhandledExceptionFilter
RtlUnwind
RaiseException
TlsSetValue
TlsGetValue
TlsFree
TlsAlloc
LocalFree
LocalAlloc
FreeLibrary
HeapFree
HeapReAlloc
HeapAlloc
GetProcessHeap
RegSetValueExA
RegSaveKeyA
RegRestoreKeyA
RegQueryValueExA
RegOpenKeyExA
RegOpenKeyA
RegCreateKeyExA
RegCreateKeyA
RegCloseKey
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
GetROP2
GetDeviceCaps
GetBkColor
SysFreeString
SysAllocStringLen
mouse_event
UnhookWindowsHookEx
ShowWindow
SetWindowsHookExA
SetThreadDesktop
SendMessageA
PostThreadMessageA
PostMessageA
IsWindowEnabled
IsWindow
IsMenu
IsDlgButtonChecked
GetWindowThreadProcessId
GetWindowTextLengthA
GetWindowTextA
GetTopWindow
GetParent
GetWindow
GetNextDlgGroupItem
GetMessageA
GetMenuItemID
GetMenuDefaultItem
GetKeyboardLayout
GetForegroundWindow
GetDlgItemTextA
GetDlgItem
GetClassNameA
GetClassLongA
GetActiveWindow
FindWindowExA
FindWindowA
EnableWindow
CreateDesktopA
CloseDesktop
CheckDlgButton
CallNextHookEx
BringWindowToTop
WSACleanup
WSAStartup
gethostbyname
socket
send
recv
inet_ntoa
htons
connect
closesocket
StartHook2
StopHook2
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE