ksHookwo
tzHookwo
Static task
static1
Behavioral task
behavioral1
Sample
3089e4f6b8290e02a366c2c1d24ae3d1_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
3089e4f6b8290e02a366c2c1d24ae3d1_JaffaCakes118.dll
Resource
win10v2004-20240704-en
Target
3089e4f6b8290e02a366c2c1d24ae3d1_JaffaCakes118
Size
35KB
MD5
3089e4f6b8290e02a366c2c1d24ae3d1
SHA1
e85fc39f6b8d5165597a1b7d60b84fcbfb823a4e
SHA256
0154fb43d79b750a7c1c4909cee489aa2d8510c09acbbcde4ebeede3f1707bc8
SHA512
fef2b45c6ba513c04900622861be5d3b839b79094673d8eab76a86d57d751cba360c89c542e934e11a80bc8caba482996c35ef7bc3172f73018f54b8f4fc182f
SSDEEP
768:Mhdx78A1u+QVz8vHa957SpRctuAIU7m4V7yC/jOn6HGEXQz0wBghEmp:MhLX0evHa9gpRWuDom4V7yC/zmEX0B
Checks for missing Authenticode signature.
resource |
---|
3089e4f6b8290e02a366c2c1d24ae3d1_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
IMAGE_FILE_BYTES_REVERSED_HI
WriteProcessMemory
WriteFile
WinExec
WideCharToMultiByte
VirtualFree
VirtualAlloc
UnmapViewOfFile
Sleep
SetFilePointer
ReadProcessMemory
ReadFile
OpenFileMappingA
MoveFileExA
MapViewOfFile
LoadLibraryA
IsValidCodePage
IsDBCSLeadByteEx
GlobalFindAtomA
GlobalAddAtomA
GetWindowsDirectoryA
GetTickCount
GetTempPathA
GetStdHandle
GetProcAddress
GetModuleFileNameA
GetLocalTime
GetLastError
GetCurrentThreadId
GetCurrentProcess
GetConsoleCP
GetCommandLineA
FindFirstFileA
FindClose
CreateThread
CreateMutexA
CreateFileA
CompareStringA
CloseHandle
GetCurrentThreadId
ExitProcess
UnhandledExceptionFilter
RtlUnwind
RaiseException
TlsSetValue
TlsGetValue
TlsFree
TlsAlloc
LocalFree
LocalAlloc
FreeLibrary
HeapFree
HeapReAlloc
HeapAlloc
GetProcessHeap
VirtualProtect
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
GetTextCharacterExtra
GetPixelFormat
GetPixel
GetNearestPaletteIndex
GetMapMode
EqualRgn
EndDoc
SysFreeString
SysAllocStringLen
UnhookWindowsHookEx
SetWindowsHookExA
SendMessageA
PostThreadMessageA
IsWindowVisible
IsWindowUnicode
IsWindowEnabled
IsWindow
IsIconic
GetWindowTextA
GetWindowLongA
GetTopWindow
GetThreadDesktop
GetSystemMetrics
GetSysColorBrush
GetSysColor
GetScrollPos
GetWindow
GetNextDlgTabItem
GetMessageTime
GetMessagePos
GetMessageA
GetListBoxInfo
GetKeyboardType
GetForegroundWindow
GetFocus
GetDlgCtrlID
GetClassNameA
GetCaretBlinkTime
GetActiveWindow
FindWindowA
EndDialog
CallNextHookEx
timeKillEvent
timeSetEvent
WSACleanup
WSAStartup
gethostbyname
socket
send
recv
htons
connect
closesocket
ksHookwo
tzHookwo
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ