JumpHookOff
JumpHookOn
Static task
static1
Behavioral task
behavioral1
Sample
2b07159bc1e2702511fcf94c6be3a699_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2b07159bc1e2702511fcf94c6be3a699_JaffaCakes118.dll
Resource
win10v2004-20240704-en
Target
2b07159bc1e2702511fcf94c6be3a699_JaffaCakes118
Size
28KB
MD5
2b07159bc1e2702511fcf94c6be3a699
SHA1
b0f77d69bad45c50100bdd5a4c5e2b19ae62629d
SHA256
09be0a29ae2da86b7a7bbcb837f1691c28246a258169455990f62bca572eb78d
SHA512
02d048914b180eb8a5b467c575af379513ea70f8500cae1792208038ccddf49d048693211471e193c2e31bd0cab4077c6d3110106cc3f68fe959eb5d8f9bb9cc
SSDEEP
384:llB3ecEIy9DpFUkJLU2kG6B0lGlBU+OJOdaxVRqD:lz3ec8hvLU21G0lGlBU+OJOdaxVcD
Checks for missing Authenticode signature.
resource |
---|
2b07159bc1e2702511fcf94c6be3a699_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetModuleHandleA
Sleep
ReadProcessMemory
GetProcAddress
LoadLibraryA
CreateEventA
VirtualProtectEx
GetCurrentProcess
GetCurrentProcessId
VirtualProtect
WideCharToMultiByte
MultiByteToWideChar
GlobalAlloc
CloseHandle
TerminateProcess
OpenProcess
Process32Next
Process32First
CreateToolhelp32Snapshot
GetModuleFileNameA
UnmapViewOfFile
MapViewOfFile
OpenFileMappingA
CreateThread
CreateMutexA
GlobalLock
GetCurrentDirectoryA
lstrlenA
WaitForSingleObject
WriteProcessMemory
SetEvent
KillTimer
wsprintfA
DefWindowProcA
SetTimer
PostQuitMessage
DestroyWindow
DispatchMessageA
PostThreadMessageA
LoadCursorA
UnhookWindowsHookEx
SetWindowsHookExA
CallNextHookEx
LoadIconA
RegisterClassA
CreateWindowExA
ShowWindow
UpdateWindow
GetMessageA
TranslateMessage
GetStockObject
RegQueryValueExA
RegOpenKeyA
RegSetValueExA
RegCloseKey
send
InternetCloseHandle
InternetReadFile
InternetOpenUrlA
InternetOpenA
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?replace@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@IIABV12@II@Z
?find@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDII@Z
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
_strlwr
memcmp
memset
strcpy
strcat
fclose
fputs
fopen
strcmp
memcpy
fread
strlen
__CxxFrameHandler
??2@YAPAXI@Z
free
_initterm
malloc
_adjust_fdiv
_itoa
JumpHookOff
JumpHookOn
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ