?HookInstaller@@YAXXZ
?HookUninstaller@@YAXXZ
StartServiceEx
StopServiceEx
_CallMsgProc@12
_CallWndProc@12
_ServiceRouteEx@12
Static task
static1
Behavioral task
behavioral1
Sample
2848759f1c351f89bbe5467a9fe84d99_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2848759f1c351f89bbe5467a9fe84d99_JaffaCakes118.dll
Resource
win10v2004-20240508-en
Target
2848759f1c351f89bbe5467a9fe84d99_JaffaCakes118
Size
24KB
MD5
2848759f1c351f89bbe5467a9fe84d99
SHA1
cdf3f169c34284a4e64d0a4959b42f4395935308
SHA256
b0b232a89cb995df5dc0f98eb0951db85fac33a4d34c304a2fe1e995e4b66d87
SHA512
9efa3f973a52dce323a19a3cb85c47990fdba597a7e44ba83346c37c953dfde055aa9d169d5031ae7657172866adaaf790fcde0450291b220899d5f4fabfd6ce
SSDEEP
192:wA4kGrEuBBQ6PRQkXZG49DB2lnlzd+WEGt:wA49rEuBBQARQkpGMDQlzMW7t
Checks for missing Authenticode signature.
resource |
---|
2848759f1c351f89bbe5467a9fe84d99_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
lstrcatA
lstrlenA
ReadProcessMemory
GetCurrentDirectoryA
GetModuleFileNameA
CreateThread
GetClassNameA
EnumChildWindows
FindWindowExA
IsWindowVisible
IsWindow
wsprintfA
SendMessageA
KillTimer
LoadCursorA
LoadIconA
RegisterClassA
CreateWindowExA
ShowWindow
UpdateWindow
GetMessageA
TranslateMessage
DispatchMessageA
DestroyWindow
PostQuitMessage
DefWindowProcA
UnhookWindowsHookEx
SetWindowsHookExA
CallNextHookEx
SetTimer
GetStockObject
InternetOpenUrlA
InternetOpenA
InternetCloseHandle
gethostname
memset
fread
strlen
fopen
fclose
strrchr
strcmp
_initterm
malloc
_adjust_fdiv
strcat
strcpy
free
_strlwr
?HookInstaller@@YAXXZ
?HookUninstaller@@YAXXZ
StartServiceEx
StopServiceEx
_CallMsgProc@12
_CallWndProc@12
_ServiceRouteEx@12
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ