JumpHookOff
JumpHookOn
ResetSSDT
Static task
static1
Behavioral task
behavioral1
Sample
2901e4de9f4d2f3897d786f6bb456ff6_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2901e4de9f4d2f3897d786f6bb456ff6_JaffaCakes118.dll
Resource
win10v2004-20240704-en
Target
2901e4de9f4d2f3897d786f6bb456ff6_JaffaCakes118
Size
32KB
MD5
2901e4de9f4d2f3897d786f6bb456ff6
SHA1
b1b5fb4bfe50c0e3f5a886b714c18252bc19a7db
SHA256
66c15a337cb35ad1c0988c444aab752000157a46663fdf8ec0c3bc0c4e9dae14
SHA512
075ebabfd42ccdb3653ef677c673a9875c3b2acd497b36fa94184d1fea9cd7d31c5c0536297f95005779f914b4816f1b4cf4b98184d02cea4534fa49600a9746
SSDEEP
384:I1vpKl7iKDfP9Wgp4BWr1+zawVDk2tWgyzLDX:I1olXlLp4Yr1GawVHByzLD
Checks for missing Authenticode signature.
resource |
---|
2901e4de9f4d2f3897d786f6bb456ff6_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
CreateEventA
VirtualProtectEx
GetCurrentProcess
GetCurrentProcessId
VirtualProtect
WideCharToMultiByte
MultiByteToWideChar
FindFirstFileA
CloseHandle
TerminateProcess
OpenProcess
Process32Next
Process32First
CreateToolhelp32Snapshot
GetModuleFileNameA
WriteFile
SizeofResource
LoadLibraryA
LoadResource
FindResourceA
GetLastError
DeviceIoControl
FreeLibrary
GlobalFree
LoadLibraryExA
ReadFile
GetFileSize
SetFileAttributesA
lstrcatA
GetSystemDirectoryA
UnmapViewOfFile
MapViewOfFile
OpenFileMappingA
CreateThread
CreateMutexA
GetProcAddress
ReadProcessMemory
Sleep
GetModuleHandleA
GlobalAlloc
GlobalLock
GetCurrentDirectoryA
lstrlenA
WaitForSingleObject
WriteProcessMemory
CreateFileA
SetEvent
CallNextHookEx
wsprintfA
DefWindowProcA
SetTimer
PostQuitMessage
DestroyWindow
DispatchMessageA
PostThreadMessageA
LoadCursorA
LoadIconA
UnhookWindowsHookEx
SetWindowsHookExA
RegisterClassA
KillTimer
CreateWindowExA
ShowWindow
UpdateWindow
GetMessageA
TranslateMessage
GetStockObject
ControlService
RegCloseKey
RegSetValueExA
RegOpenKeyA
RegQueryValueExA
CloseServiceHandle
OpenServiceA
OpenSCManagerA
StartServiceA
send
InternetCloseHandle
InternetReadFile
InternetOpenUrlA
InternetOpenA
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?find@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDII@Z
?replace@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@IIABV12@II@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
fread
memcpy
??2@YAPAXI@Z
free
_initterm
malloc
_strlwr
_itoa
strlen
_EH_prolog
__CxxFrameHandler
strcpy
memset
memcmp
strcat
fclose
fputs
fopen
_adjust_fdiv
strcmp
JumpHookOff
JumpHookOn
ResetSSDT
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ