EnHookWindow
UninstallHook
sub_getmessage
sub_keyboard
sub_mouse
sub_pic
Static task
static1
Behavioral task
behavioral1
Sample
407c06f68d75b76eb3414d5dfd071a49_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
407c06f68d75b76eb3414d5dfd071a49_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
407c06f68d75b76eb3414d5dfd071a49_JaffaCakes118
Size
59KB
MD5
407c06f68d75b76eb3414d5dfd071a49
SHA1
5cb4f92610f8eebe7acc253f0f4b60551cea4dc6
SHA256
7fe4887f1af12c794cebcffcd9d0cc2316c15d95dfe4bc1ee638eefac3802b02
SHA512
958fa81862f5c55e5aba05e5631165177b49350fc29f7c5c723622471ec522bec732ead30ca9d76e585eec0f9261431cc7974f25399d1782047ee5e36637c68a
SSDEEP
768:v8D84DQ73C68QrkA7qu70KZMNPg478D84DQ73C68QrkA7qu70KZMNPg45k4s:vZE4C6l4KuNPgMZE4C6l4KuNPgqq
Checks for missing Authenticode signature.
resource |
---|
407c06f68d75b76eb3414d5dfd071a49_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
ToAscii
SendInput
MapVirtualKeyA
GetWindowTextA
GetKeyboardState
GetForegroundWindow
GetDC
wsprintfA
GetClientRect
GetCurrentProcess
GetExitCodeThread
GetFileSize
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GetTempPathA
GetWindowsDirectoryA
GlobalAlloc
LoadLibraryA
MultiByteToWideChar
OpenProcess
CloseHandle
RtlMoveMemory
RtlZeroMemory
SetFileAttributesA
ExitThread
Sleep
TerminateProcess
VirtualAlloc
VirtualAllocEx
VirtualFree
VirtualFreeEx
VirtualProtectEx
WaitForSingleObject
WideCharToMultiByte
WriteProcessMemory
lstrcatA
lstrcmpA
lstrcmpiA
lstrcpyA
lstrcpynA
lstrlenA
DisableThreadLibraryCalls
DeleteFileA
CreateThread
CreateRemoteThread
SetFilePointer
CreateFileA
ReadFile
RegQueryValueExA
StrChrA
StrStrA
DeleteObject
DeleteDC
CreateCompatibleDC
BitBlt
SelectObject
CreateCompatibleBitmap
CLSIDFromString
GdiplusShutdown
GdipSaveImageToFile
GdipDisposeImage
GdipCreateBitmapFromHBITMAP
GdiplusStartup
closesocket
connect
gethostbyname
inet_addr
ntohs
recv
send
socket
WSAStartup
WSACleanup
strrchr
EnHookWindow
UninstallHook
sub_getmessage
sub_keyboard
sub_mouse
sub_pic
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ