InstallHook
UninstallHook
Static task
static1
Behavioral task
behavioral1
Sample
3df388747f0155792763d12c792a7e84_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3df388747f0155792763d12c792a7e84_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
3df388747f0155792763d12c792a7e84_JaffaCakes118
Size
64KB
MD5
3df388747f0155792763d12c792a7e84
SHA1
185b042c28b5eebcde426642387cddaac0b67289
SHA256
5e2844676ed1a379704ed7368cadbe6f471299e0567e097352761cf8171a4c85
SHA512
e8043396ccf5817d5fcfe3a4f81753e9b7c53c2bc4f7813a9c0b4838ba113fce7b94021c5160ebc676641f7cdfe0e848e7e65a71bf5fb0b4eada189546928028
SSDEEP
1536:1/YerZf0SP4Yny3ghGuAseHFUJEt9tnJHZcp4D7:KerZDgYnCgmGa5nHcp4D
Checks for missing Authenticode signature.
resource |
---|
3df388747f0155792763d12c792a7e84_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
lstrlenA
Sleep
GetVersion
GetLocalTime
VirtualQueryEx
WriteProcessMemory
VirtualProtectEx
ReadProcessMemory
CloseHandle
OpenProcess
GetCurrentProcessId
CreateThread
GetPrivateProfileStringA
GetPrivateProfileIntA
GetModuleFileNameA
GetModuleHandleA
HeapSize
LCMapStringW
LCMapStringA
GetSystemInfo
VirtualProtect
ReadFile
SetEndOfFile
GetSystemTimeAsFileTime
GetTickCount
QueryPerformanceCounter
LoadLibraryA
GetOEMCP
GetACP
GetLocaleInfoA
GetCPInfo
GetCurrentThreadId
GetCommandLineA
GetVersionExA
HeapFree
GetLastError
EnterCriticalSection
LeaveCriticalSection
TlsAlloc
SetLastError
TlsFree
TlsSetValue
TlsGetValue
GetProcAddress
ExitProcess
TerminateProcess
GetCurrentProcess
HeapAlloc
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
UnhandledExceptionFilter
WriteFile
VirtualAlloc
HeapReAlloc
SetStdHandle
FlushFileBuffers
RtlUnwind
InterlockedExchange
VirtualQuery
CreateFileA
InitializeCriticalSection
SetFilePointer
GetStringTypeA
MultiByteToWideChar
GetStringTypeW
CallNextHookEx
SetWindowsHookExA
UnhookWindowsHookEx
MessageBoxA
GetWindowTextA
FindWindowA
wsprintfA
FindWindowExA
GetMappedFileNameA
PathStripPathA
send
recv
WSACleanup
closesocket
connect
htons
socket
WSAStartup
gethostbyname
InstallHook
UninstallHook
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ